Inventory control
First Claim
1. A method of controlling an inventory of items stored at a location using at least one identification tag reader and a surveillance system including a plurality of cameras, the method comprising:
- using the identification tag reader to detect an identification tag, wherein the identification tag is associated with an item;
determining risk associated with the identification tag based on whether the identification tag has previously been removed from the location and whether the identification tag is being returned to the location,wherein determining risk associated with the identification tag includes determining from among multiple risk levels, a higher risk level associated with the identification tag if the identification tag is being returned to the location based on a location of the identification tag and a timestamp of return detection of the identification tag by the identification tag reader; and
determining, based on risk level associated with the identification tag, which of the plurality of cameras to select in order to view the area around the identification tag.
9 Assignments
0 Petitions
Accused Products
Abstract
A method, article of manufacture, and apparatus for inventory control of items in a location are disclosed. In an embodiment, this comprises a surveillance system comprising a plurality of cameras and at least one display, at least one identification tag, at least one identification tag reader configured to read the identification tag and placed to cover at least a portion of the location, and a computer configured to process information including the identification tag read by the reader. In response to the information, the computer controls a video camera to display an image showing an area around the identification tag. This may be based on a determination of heightened risk, such as when the identification tag is associated with a receipt and is brought back to the location after being removed from the location.
27 Citations
17 Claims
-
1. A method of controlling an inventory of items stored at a location using at least one identification tag reader and a surveillance system including a plurality of cameras, the method comprising:
-
using the identification tag reader to detect an identification tag, wherein the identification tag is associated with an item; determining risk associated with the identification tag based on whether the identification tag has previously been removed from the location and whether the identification tag is being returned to the location, wherein determining risk associated with the identification tag includes determining from among multiple risk levels, a higher risk level associated with the identification tag if the identification tag is being returned to the location based on a location of the identification tag and a timestamp of return detection of the identification tag by the identification tag reader; and determining, based on risk level associated with the identification tag, which of the plurality of cameras to select in order to view the area around the identification tag. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A computer program product for controlling an inventory of items stored at a location using at least one identification tag reader and a surveillance system including a plurality of cameras and at least one display, the computer program product comprising a computer usable medium having machine readable code embodied therein for:
-
using the identification tag reader to detect an identification tag, wherein the identification tag is associated with an item; determining risk associated with the identification tag based on whether the identification tag has previously been removed from the location and whether the identification tag is being returned to the location, wherein determining risk associated with the identification tag includes determining, from among multiple risk levels, a higher risk level associated with the identification tag if the identification tag is being returned to the location based on a location of the identification tag and a timestamp of return detection of the identification tag by the identification tag reader; and determining, based on risk level associated with the identification tag, which of the plurality of cameras to select in order to view the area around the identification tag. - View Dependent Claims (8, 9, 10, 11)
-
-
12. A system for inventory control of items stored at a location, comprising:
-
a surveillance system comprising a plurality of cameras and at least one display; at least one identification tag, wherein the identification tag is associated with an item; at least one identification tag reader configured to read the identification tag and configured to cover at least a portion of the location, wherein the portion includes non-access points to the location; and a computer configured to process information including the identification tag read by the reader, to determining risk associated with the identification tag based on whether the identification tag has previously been removed from the location and whether the identification tag is being returned to the location, wherein determining risk associated with the identification tag includes determining from among multiple risk levels, a higher risk level associated with the identification tag if the identification tag is being returned to the location based on a location of the identification tag and a timestamp of return detection of the identification tag by the identification tag reader, and in response to the information, displaying an image on the display by selecting one of the plurality of cameras to view an area around the identification tag. - View Dependent Claims (13, 14, 15, 16, 17)
-
Specification