WO1987004282A1 - Inventory control system - Google Patents

Inventory control system Download PDF

Info

Publication number
WO1987004282A1
WO1987004282A1 PCT/AU1986/000384 AU8600384W WO8704282A1 WO 1987004282 A1 WO1987004282 A1 WO 1987004282A1 AU 8600384 W AU8600384 W AU 8600384W WO 8704282 A1 WO8704282 A1 WO 8704282A1
Authority
WO
WIPO (PCT)
Prior art keywords
tag
signal
tags
control system
alarm
Prior art date
Application number
PCT/AU1986/000384
Other languages
French (fr)
Inventor
Michael John Yerbury
Gregory Charles Hurst
Original Assignee
Advanced Systems Research Pty. Ltd.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Advanced Systems Research Pty. Ltd. filed Critical Advanced Systems Research Pty. Ltd.
Publication of WO1987004282A1 publication Critical patent/WO1987004282A1/en

Links

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/22Electrical actuation
    • G08B13/24Electrical actuation by interference with electromagnetic field distribution
    • G08B13/2402Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting
    • G08B13/2428Tag details
    • G08B13/2434Tag housing and attachment details
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/02Mechanical actuation
    • G08B13/14Mechanical actuation by lifting or attempted removal of hand-portable articles
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/22Electrical actuation
    • G08B13/24Electrical actuation by interference with electromagnetic field distribution
    • G08B13/2402Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting
    • G08B13/2405Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting characterised by the tag technology used
    • G08B13/2414Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting characterised by the tag technology used using inductive tags
    • G08B13/2417Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting characterised by the tag technology used using inductive tags having a radio frequency identification chip
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/22Electrical actuation
    • G08B13/24Electrical actuation by interference with electromagnetic field distribution
    • G08B13/2402Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting
    • G08B13/2451Specific applications combined with EAS
    • G08B13/2462Asset location systems combined with EAS

Definitions

  • the present invention relates generally to an improvement to an inventory control system for use in locations such as retail outlets, warehouses and so on.
  • the invention provides a system which, in its preferred embodiment, can be used to identify individual objects, to allow an inventory of such objects to be maintained and to implement a multi-function security mechanism which reduces the risk of loss or theft of tagged objects.
  • tags are provided which cause an alarm to be set off in both situations i.e. when a tag is detached or tampered with inside the store (other than in the approved way at the point of sale) as well as when an intact tag is carried through the exit.
  • the tag is uniquely encoded such that information about the item (e.g. type of item, colour, shape, model) from which a tag was detached, as well as its approximate location, can be immediately made available to security personnel in the store when an alarm condition is triggered.
  • information about the item e.g. type of item, colour, shape, model
  • Bar-code tags for example, can be combined with optical readers to speed the recording of items of stock and to minimise the errors which occur when manual recording and subsequent transcription are used.
  • optical readers to speed the recording of items of stock and to minimise the errors which occur when manual recording and subsequent transcription are used.
  • the unique code assigned to each tag is used to identify goods for the purposes of stock taking.
  • the present invention consists in a security tag comprising attachment means, alarm sensor means associated with the attachment means to signal when the attachment means are disconnected from an article to which the tag was attached and transmitter means to generate a radiated signal in response to the alarm means signalling the disconnection of the attachment means from said goods.
  • the tags are provided with encoding means enabling identification of a tag which is transmitting an alarm signal.
  • Tags are also preferably provided with enabling and disabling means which are operated in the preferred embodiment by digitally encoded signals transmitted by an enabling transmitter.
  • the tags of the preferred embodiment will also include a receiver adapted to respond to a short range transmitted signal to cause the tag to transmit its identifying signal.
  • an inventory control system in which the tags of the present invention are used.
  • Fig. 1 schematically illustrates an embodiment of a tag according to the invention
  • Fig. 2 schematically illustrates an interrogator and control system of an inventory control system which makes, use of the tag of Fig. 1.
  • tags to be attached to the objects which are being controlled
  • interrogators to be attached to the objects which are being controlled
  • computer-based control system which operates the interrogators, maintains the inventory records and * indicates in any required fashion the signalling of an alarm when this becomes necessary.
  • the tags should be small (so that they can be inconspicuously and harmlessly attached) , they should be economically priced, they should have an operating life of several years (at least equal to the maximum expected residence time of any one item of stock in a given location) , they should be capable of receiving control signals from interrogators at control points or points of sale and they should be capable of transmitting radio frequency signals over ranges of several tens of metres.
  • the tags preferably are capable of implementing the following functions: i) Storing coded identification (ID) information which may be associated, via software in the control system, with the object to be tagged, ii) Repeatedly transmitting by radio the previously- stored ID code and an alarm signal, when the method of attachment of the tag to the object is interfered with, iii) Repeatedly transmitting by radio the previously-stored ID code and an alarm signal when the tag passes through the field of an interrogator at a control point, iv) Transmitting by radio the previously-stored ID code in response to an interrogating signal at the point of sale for the purpose of stock control. v) Enabling or disabling the functions in (ii) , (iii) and (iv) above in response to an appropriate interrogating signal at the point of sale.
  • ID coded identification
  • the interrogators preferably will be capable of transmitting radio signals to the tags, receiving a number of radio frequency signals and interacting with the control system to perform the variety of required functions.
  • the functions of the interrogator will vary depending on whether it is being used to monitor an area for tag detachment alarm signals, to identify each item at an inventory check point or point of sale for the purpose of inventory control, or to carry out a security check at a control point.
  • all interrogators are able to receive and decode identification and alarm signals and pass these codes to the control system.
  • interrogators used to perform security check or inventory control functions are able to transmit the appropriate signals to activate the responses in the tags.
  • the control system will: i) maintain the list of all items in the inventory and their associated coded tags, ii) control the functions of the interrogators, iii) receive identification and alarm information passed from the tags, and iv) activate any desired form of alarm response when the corresponding signal is transmitted by a tag and processed by an interrogator.
  • An interrogator in the stockroom is then used to enable the alarm functions of the tag and read its ID code.
  • a keyboard connected to the control system information relating to the tagged item is entered and associated in the control system database with the tag.
  • an interrogator transmits a short range coded signal to trigger the identification function of the tag.
  • the tag When brought within the field of the interrogator the tag replies with its previously-stored ID code. The interrogator then passes this sales information to the control system. iii) The interrogator then transmits a coded signal to disable the security alarm functions and thus enables the tag to be removed from the item without setting off the alarm. In addition the disabled tag may be taken through a security control point (if necessary) without triggering the corresponding alarm function, iv) At the point of sale following a "no sale” the interrogator may transmit a coded signal to re-enable the alarm functions of the tag. b) Security Control The following description is based on the presence of two interrogators operated by a control system.
  • interrogator A is located at some convenient point in the warehouse or retail store, and that interrogator B is at an exit or security control point.
  • interrogator A is in receiving mode and the tags attached to the objects secured are in their quiescent state. If the method of attachment of the object to the tag is tampered with (e.g. by breaking the attachment means), the tag repeatedly transmits the previously-stored code and alarm signal to interrogator A. This information is received by interrogator A, decoded and sent to the control system where an alarm function is implemented.
  • Interrogator B is placed near the control point and has an antenna structure such that it has a narrow field of view. Interrogator B repeatedly sends the signal which will activate the second alarm function of the tag. When it is in the field of the interrogator and detects the signal the tag repeatedly sends its previously-stored ID code and alarm signal, and the control system decodes this information and activates any desired security action such as ringing bells, visual display on a terminal near the control point, etc.
  • security staff know not only that an item is being removed but are also provided immediately with a full description of that item.
  • the security control function described above may be enabled or disabled at the stockroom or point of sale as described in (a) above.
  • the preferred embodiment of the inventory control system comprises several components: these being a central computer to control the operation of the system, several interrogator units, and individual identification tags to be attached to individual items of stock.
  • the interrogators may be divided into two types depending upon their specialised application as point-of-sale interrogators or control-point interrogators. The differences between these types will be discussed later.
  • the preferred embodiment of the tag is illustrated schematically in Figure 1.
  • a coded electromagnetic signal from the interrogator is picked up on the input antenna 1 which is connected to tuned circuit.2.
  • the signal may be situated anywhere in the radio frequency spectrum from LF to UHF but might typically be in the VHF band.
  • the information is coded in the form of amplitude modulation of the carrier signal.
  • Four different commands are required to be detected and these may be coded in many possible ways but, by way of example, are encoded in the preferred embodiment using an error correcting ' digital code such as a BCH 7/4 code.
  • a detector circuit 3 with very low quiescent power consumption detects the presence of a signal at the tuned circuit 2 and causes the signal processing components of the tag to be connected to the battery 4 by the power control switch 5.
  • the demodulator 6 in conjunction with the clock recovery circuit 7 extracts the data from the input signal and stores it in the data register 8.
  • the function controller 9 causes the appropriate tag response to be performed dependent upon the information in the data register 8 and the state of the transmit enable memory 10.
  • Table 1 lists the various inputs and the responses of the tag to these inputs as implemented by the function controller.
  • the transmit enable memory is set to "disabled”
  • the only response will be to an interrogator command to set the memory to "enabled” .
  • the function controller 9 activates the code generator 12 to generate a digital code stream corresponding to the code stored in the ID code storage memory 13 plus.further bits to indicate the nature of the response; i.e. point-of-sale identification, control-point alarm or detachment alarm.
  • the code generator generates a binary sequence with error correcting capability such as a
  • ID code storage 13 may be implemented in many ways obvious to those skilled in the art but, for example, could be stored in a programmable read only memory programmed at the time of assembly of the tag.
  • the output of the code generator 12 is passed to the modulater 14 where it modulates a radio frequency (RF) signal generated in the RF source 15.
  • the resulting signal is radiated from the output antenna 16.
  • the frequency of the RF signal is preferably in the VHF/UHF region for reasons of antenna efficiency but is not limited thereto.
  • the frequency may be controlled in many ways obvious to those skilled in the art, for example, by transmission from the interrogator of a reference for synchronisation, by a crystal or by a surface accoustic wave resonator.
  • the tag responds to the breaking of its attachment to an object. This is detected by the detachment sensor 11 which activates the function controller 9 if the transmit enable is set to "enabled".
  • the detachment detector may be implemented in many ways but two means will be indicated by way of example. Referring to Fig. 3, a preferred embodiment of the tag 20 is attached to an item to be monitored by means of an insulated wire 21 of finite resistance. A very low power comparator incorporated into the detachment detector 11, then monitors the resistance of the wire to detect the occurrence of either an open circuit or a short circuit.
  • One end of the wire 21 is connected to the detachment detector 11 by a releasable electrical connection means 22 to enable easy removal of the tag from the article when sold.
  • the tag 20 of a second embodiment contains one or more Wiegand wires 25 (refer to Australian Patent Specification No. 479,034) enclosed in a sense coil 23 which is connected to a very low power pulse detector 11.
  • the tag is attached to the item to be monitored by one or more pins 28 through the item, or other attachment means such as adhesive, and a magnet 26 is attached to the item adjacent to the tag but on the other side of the item so that the Wiegand wire 25 is in the field of the magnet 26.
  • the magnet 26 is carried on a member 27 which also carries the pins 28 and the pins are received in co-operating receprocals 29 in the tag.
  • the magnetic thresholds of the wires may be chosen such that an increasing magnetic field strength as well as a decreasing magnetic field strength may be detected. In this way the possibility of circumventing the detachment alarm by bringing another magnet close to the tag prior to detachment is reduced.
  • the detector circuitry is only powered up when the transmit enable memory is set to "enabled".
  • the power for operation of the tag is supplied by a battery 4 such as a lithium cell. Since the quiescent current drain of the tag may be kept to a level of only a micro-ampere or two a cell with a capacity of 50 to 100 milliampere-hour will have a lifetime of several years. Battery lifetime is maximised by having only necessary circuitry powered up at any time. This is accomplished by the power control module 5 which takes input from the signal detector 3 and the detachment detector 11 and powers the remainder of the tag only when appropriate. Only the signal detector 3 and the transmit enable memory 10 are powered at all times. In the preferred embodiment of the tag almost the entire circuitry is implemented in a single custom-integrated circuit. This makes it possible for the tag to be packaged in a form small enough to have wide application.
  • a battery 4 such as a lithium cell. Since the quiescent current drain of the tag may be kept to a level of only a micro-ampere or two a cell with a capacity of 50 to 100 milliampere-hour will have a lifetime of
  • a central computer 40 controls a plurality of interrogators 41, 42, 43, 44 distributed throughout the premises which are being monitored for inventory control.
  • interrogators are essentially identical in operation in that they consist of a controller/code-generator to generate the appropriate code for transmission, an RF source and a modulation means 46 attached to a transmitting antenna 45. Also they have one or more receivers 47 which receive signals through individual receiving antennas 48, decode the transmission from the tags 20 and pass the relevant data to the central computer. The receivers on all interrogators are at all times "listening" for an alarm signal from any active tag 20.
  • the differences between the interrogators relate to the different ways in which they are used: i)
  • the point-of-sale (POS) interrogators 41 and 42 are equipped with a transmitting antenna 45a which, in conjunction with a low output power level, confines its interrogation range to a localised region at the POS desk. In normal operation it transmits continuously the point-of-sale identification or IDENTIFY code.
  • POS point-of-sale
  • IDENTIFY code point-of-sale identification
  • the tag 20 responds to the transmitted code by transmitting its ID code.
  • the interrogator Upon receipt of the ID code via antenna 48a and receiver 47a, the interrogator sends the DISABLE code and then resumes transmission of the IDENTIFY command.
  • the process is repeated until the DISABLE command takes effect or a failure is registered.
  • the ID information is sent to the central computer which notes that the item is about to be sold.
  • the price details are registered on the cash register.
  • a "beeper" indicates to the cashier that all details about the item have been recorded in the central computer and that the tag 20 may be removed safely. If a sale is not completed before the tag is removed, the cashier can ENABLE the tag again and cancel the information at the central computer (or simply record a NO SALE with the information) before restoring the item with its tag to the shop floor.
  • all POS interrogators are synchronised by the control computer such that they trigger the ID code transmissions simultaneously at all points of sale and at roughly half second intervals. Thus there are regular "quiet" periods during which alarm signals can be received reliably.
  • a version of the POS interrogator is used to ENABLE each tag and identify it after attachment to a new item of stock.
  • the ID number is associated in the central computer with a detailed description of the item, ii)
  • a control-point interrogator is positioned at all access points through which it is desired to detect the carriage of active tags 20.
  • the antenna 45b is thus positioned to localise the transmitted signal to the region and the control-point signal is transmitted continually. In the event of an active tag 20 entering the region, the tag will respond by transmitting its ID code plus a control-point alarm signal, continually.
  • Some receivers 47 in the vicinity will detect the alarm but from the relative strength of the received signal at the receivers in question and the recognition of the alarm as a control-point alarm, the precise location of the potential theft can be determined by the computer.
  • the tag ID is passed to the computer by the interrogators and thus a description of the stolen item is immediately available.
  • Interrogators installed in a store or warehouse are equipped with sufficient receivers 47 and their associated receiving antennas 48 to adequately cover the entire area to be controlled.
  • one or more receivers 47 at one or more interrogators 41, 42, 43, 44 will receive and demodulate the signal and pass the decoded information to the central computer 40.
  • the central computer will be able to signal to security staff via an appropriate terminal 50 the nature of the alarm and a precise description of the item in question. From the known location of the receivers that received the signal the computer may also indicate the approximate location of the tag.
  • the central computer 40 maintains the inventory of tags 20 in use, controls the functions of the interrogators 41, 42, 43, 44 and interprets all alarm information for implementation of security functions. TABLE 1
  • Control-point signal enabled transmit ID code with control-point alarm bit set

Abstract

Inventory control tags comprise a detachment detector (11) associated with means for attaching the tag to an article such that detachment of the tag causes an alarm signal to be transmitted by a transmitter (14, 15, 16). The alarm signal is encoded by a code generator (12) to provide a uniquely coded signal which will identify the tag from which it is produced. Tags also include a receiver (1, 2, 3) for receiving interrogation signals in response to which the tag transmits its coded identifying signal. The tags are also switchable into and out of a deactivated state when specially coded disable/enable signals are received. These disable/enable signals cause a transmit enable memory (10) to toggle in state to enable and disable operation of the code generator (12) and transmitter (14, 15, 16) circuits.

Description

INVENTORY CONTROL SYSTEM The present invention relates generally to an improvement to an inventory control system for use in locations such as retail outlets, warehouses and so on. In particular the invention provides a system which, in its preferred embodiment, can be used to identify individual objects, to allow an inventory of such objects to be maintained and to implement a multi-function security mechanism which reduces the risk of loss or theft of tagged objects.
The description of the present invention, and the system with which it is associated, will be given in terms of an intended application in retail stores and warehouses, but it will be recognised by persons skilled in the art that the possible applications of the invention extend beyond these specific examples.
The advantages of providing security tags on items in retail stores are well known. The principal advantage is that an alarm is set off when an item, from which the tag has not been removed at the point of sale, is carried out of the exit of the store. In some existing systems a supplementary benefit exists in that the coded tag may be used to maintain an inventory of stock. These conventional security tags signal an alarm only when an intact tag is carried through the exit of the store but not when the tag is removed by the thief or otherwise detached inside the store and some distance from the exit. In accordance with the present invention, tags are provided which cause an alarm to be set off in both situations i.e. when a tag is detached or tampered with inside the store (other than in the approved way at the point of sale) as well as when an intact tag is carried through the exit. In a preferred embodiment, the tag is uniquely encoded such that information about the item (e.g. type of item, colour, shape, model) from which a tag was detached, as well as its approximate location, can be immediately made available to security personnel in the store when an alarm condition is triggered.
The advantages of recording items of stock with the aid of some form of "reading" instrument are also well known. Bar-code tags, for example, can be combined with optical readers to speed the recording of items of stock and to minimise the errors which occur when manual recording and subsequent transcription are used. These conventional inventory systems, as typified by bar-code and similar short-range systems, provide no security functions.
In preferred embodiments of the present invention the unique code assigned to each tag is used to identify goods for the purposes of stock taking.
The present invention consists in a security tag comprising attachment means, alarm sensor means associated with the attachment means to signal when the attachment means are disconnected from an article to which the tag was attached and transmitter means to generate a radiated signal in response to the alarm means signalling the disconnection of the attachment means from said goods.
In preferred embodiments of the invention the tags are provided with encoding means enabling identification of a tag which is transmitting an alarm signal. Tags are also preferably provided with enabling and disabling means which are operated in the preferred embodiment by digitally encoded signals transmitted by an enabling transmitter. The tags of the preferred embodiment will also include a receiver adapted to respond to a short range transmitted signal to cause the tag to transmit its identifying signal.
According to another aspect of the invention, an inventory control system is provided, in which the tags of the present invention are used.
Preferred embodiments of the tag and the inventory control system will now be described, by way of example, with reference to the accompanying drawings in which:- Fig. 1 schematically illustrates an embodiment of a tag according to the invention; and
Fig. 2 schematically illustrates an interrogator and control system of an inventory control system which makes, use of the tag of Fig. 1. In an inventory control system which uses tags according to the present invention, there are three basic components: the tags to be attached to the objects which are being controlled, one or more interrogators, and a computer-based control system which operates the interrogators, maintains the inventory records and * indicates in any required fashion the signalling of an alarm when this becomes necessary.
The preferred features of the tags to be attached to the objects are that the tags should be small (so that they can be inconspicuously and harmlessly attached) , they should be economically priced, they should have an operating life of several years (at least equal to the maximum expected residence time of any one item of stock in a given location) , they should be capable of receiving control signals from interrogators at control points or points of sale and they should be capable of transmitting radio frequency signals over ranges of several tens of metres.
The tags preferably are capable of implementing the following functions: i) Storing coded identification (ID) information which may be associated, via software in the control system, with the object to be tagged, ii) Repeatedly transmitting by radio the previously- stored ID code and an alarm signal, when the method of attachment of the tag to the object is interfered with, iii) Repeatedly transmitting by radio the previously-stored ID code and an alarm signal when the tag passes through the field of an interrogator at a control point, iv) Transmitting by radio the previously-stored ID code in response to an interrogating signal at the point of sale for the purpose of stock control. v) Enabling or disabling the functions in (ii) , (iii) and (iv) above in response to an appropriate interrogating signal at the point of sale.
The interrogators preferably will be capable of transmitting radio signals to the tags, receiving a number of radio frequency signals and interacting with the control system to perform the variety of required functions.
The functions of the interrogator will vary depending on whether it is being used to monitor an area for tag detachment alarm signals, to identify each item at an inventory check point or point of sale for the purpose of inventory control, or to carry out a security check at a control point.
In the preferred system, all interrogators are able to receive and decode identification and alarm signals and pass these codes to the control system. In addition interrogators used to perform security check or inventory control functions are able to transmit the appropriate signals to activate the responses in the tags. In the preferred embodiment of the inventory control system, the control system will: i) maintain the list of all items in the inventory and their associated coded tags, ii) control the functions of the interrogators, iii) receive identification and alarm information passed from the tags, and iv) activate any desired form of alarm response when the corresponding signal is transmitted by a tag and processed by an interrogator. The method of operation of the preferred system will now be described as it relates to (a) inventory control, and (b) security control in a retail store or warehouse, (a) Inventory Control i) At the inventory entry point (e.g. in the stockroom) a coded tag is applied to each item to be controlled by means of an attachment whose integrity can be monitored by the tag itself.
An interrogator in the stockroom is then used to enable the alarm functions of the tag and read its ID code. By means of a keyboard connected to the control system information relating to the tagged item is entered and associated in the control system database with the tag. ii) At the point of sale an interrogator transmits a short range coded signal to trigger the identification function of the tag.
When brought within the field of the interrogator the tag replies with its previously-stored ID code. The interrogator then passes this sales information to the control system. iii) The interrogator then transmits a coded signal to disable the security alarm functions and thus enables the tag to be removed from the item without setting off the alarm. In addition the disabled tag may be taken through a security control point (if necessary) without triggering the corresponding alarm function, iv) At the point of sale following a "no sale" the interrogator may transmit a coded signal to re-enable the alarm functions of the tag. b) Security Control The following description is based on the presence of two interrogators operated by a control system. This number is chosen so as to illustrate the various features of the invention, but it will be obvious to persons skilled in the art that the functions could be combined into a single interrogator or that the number of interrogators could be increased. The description assumes that interrogator A is located at some convenient point in the warehouse or retail store, and that interrogator B is at an exit or security control point. i) In normal circumstances interrogator A is in receiving mode and the tags attached to the objects secured are in their quiescent state. If the method of attachment of the object to the tag is tampered with (e.g. by breaking the attachment means), the tag repeatedly transmits the previously-stored code and alarm signal to interrogator A. This information is received by interrogator A, decoded and sent to the control system where an alarm function is implemented. Since software in the control system can associate this code with a particular item of stock, the store security staff immediately know the nature of the item from which the tag is being removed. Moreover, the fact that the alarm signal was received most strongly on one particular interrogator (A in this particular illustration) provides a general indication of the location of the potential theft. By using a plurality of such interrogators, the locality can be more clearly defined.
Although the above description is presented in terms of theft control it is obvious that the system operation implements a more general function of system security by monitoring the integrity of tag attachment. ii) Interrogator B is placed near the control point and has an antenna structure such that it has a narrow field of view. Interrogator B repeatedly sends the signal which will activate the second alarm function of the tag. When it is in the field of the interrogator and detects the signal the tag repeatedly sends its previously-stored ID code and alarm signal, and the control system decodes this information and activates any desired security action such as ringing bells, visual display on a terminal near the control point, etc. As in (i) above, security staff know not only that an item is being removed but are also provided immediately with a full description of that item. The security control function described above may be enabled or disabled at the stockroom or point of sale as described in (a) above.
As can be seen from the above discussion, the preferred embodiment of the inventory control system comprises several components: these being a central computer to control the operation of the system, several interrogator units, and individual identification tags to be attached to individual items of stock. Whilst having broadly the same operational characteristics, the interrogators may be divided into two types depending upon their specialised application as point-of-sale interrogators or control-point interrogators. The differences between these types will be discussed later. The preferred embodiment of the tag is illustrated schematically in Figure 1. A coded electromagnetic signal from the interrogator is picked up on the input antenna 1 which is connected to tuned circuit.2. The signal may be situated anywhere in the radio frequency spectrum from LF to UHF but might typically be in the VHF band. The information is coded in the form of amplitude modulation of the carrier signal. Four different commands are required to be detected and these may be coded in many possible ways but, by way of example, are encoded in the preferred embodiment using an error correcting 'digital code such as a BCH 7/4 code. Many other possibilities will be obvious to those skilled in the art. A detector circuit 3 with very low quiescent power consumption detects the presence of a signal at the tuned circuit 2 and causes the signal processing components of the tag to be connected to the battery 4 by the power control switch 5. The demodulator 6 in conjunction with the clock recovery circuit 7 extracts the data from the input signal and stores it in the data register 8. The function controller 9 causes the appropriate tag response to be performed dependent upon the information in the data register 8 and the state of the transmit enable memory 10. Table 1 lists the various inputs and the responses of the tag to these inputs as implemented by the function controller. In the case where the transmit enable memory is set to "disabled", the only response will be to an interrogator command to set the memory to "enabled" . In the case where the memory is set to "enabled" and an input is received to cause the tag to transmit, the function controller 9 activates the code generator 12 to generate a digital code stream corresponding to the code stored in the ID code storage memory 13 plus.further bits to indicate the nature of the response; i.e. point-of-sale identification, control-point alarm or detachment alarm. In the preferred embodiment the code generator generates a binary sequence with error correcting capability such as a
BCH 31/21. This code would give a capability of providing 2 19, or approximately half a million, unique tags. The
ID code storage 13 may be implemented in many ways obvious to those skilled in the art but, for example, could be stored in a programmable read only memory programmed at the time of assembly of the tag.
The output of the code generator 12 is passed to the modulater 14 where it modulates a radio frequency (RF) signal generated in the RF source 15. The resulting signal is radiated from the output antenna 16. The frequency of the RF signal is preferably in the VHF/UHF region for reasons of antenna efficiency but is not limited thereto. The frequency may be controlled in many ways obvious to those skilled in the art, for example, by transmission from the interrogator of a reference for synchronisation, by a crystal or by a surface accoustic wave resonator.
In addition to inputs received from an interrogator, the tag responds to the breaking of its attachment to an object. This is detected by the detachment sensor 11 which activates the function controller 9 if the transmit enable is set to "enabled". The detachment detector may be implemented in many ways but two means will be indicated by way of example. Referring to Fig. 3, a preferred embodiment of the tag 20 is attached to an item to be monitored by means of an insulated wire 21 of finite resistance. A very low power comparator incorporated into the detachment detector 11, then monitors the resistance of the wire to detect the occurrence of either an open circuit or a short circuit. In this way the breaking of the wire is readily detected and in addition any attempt to bypass the wire prior to breaking it in the hope of circumventing the alarm may also be detected by the tag. One end of the wire 21 is connected to the detachment detector 11 by a releasable electrical connection means 22 to enable easy removal of the tag from the article when sold.
Referring to Fig. 4 the tag 20 of a second embodiment contains one or more Wiegand wires 25 (refer to Australian Patent Specification No. 479,034) enclosed in a sense coil 23 which is connected to a very low power pulse detector 11. In this case the tag is attached to the item to be monitored by one or more pins 28 through the item, or other attachment means such as adhesive, and a magnet 26 is attached to the item adjacent to the tag but on the other side of the item so that the Wiegand wire 25 is in the field of the magnet 26. In the illustrated embodiment the magnet 26 is carried on a member 27 which also carries the pins 28 and the pins are received in co-operating receprocals 29 in the tag. In this configuration, separation of the tag from the magnetic backing will cause a pulse to be induced in the sense coil 23 by the Wiegand wire 25. This pulse is detected in the pulse detector 11. In the case where more than one Wiegand wire is employed the magnetic thresholds of the wires may be chosen such that an increasing magnetic field strength as well as a decreasing magnetic field strength may be detected. In this way the possibility of circumventing the detachment alarm by bringing another magnet close to the tag prior to detachment is reduced.
In all embodiments of the detachment detector, the detector circuitry is only powered up when the transmit enable memory is set to "enabled".
In the preferred embodiment of the tag the power for operation of the tag is supplied by a battery 4 such as a lithium cell. Since the quiescent current drain of the tag may be kept to a level of only a micro-ampere or two a cell with a capacity of 50 to 100 milliampere-hour will have a lifetime of several years. Battery lifetime is maximised by having only necessary circuitry powered up at any time. This is accomplished by the power control module 5 which takes input from the signal detector 3 and the detachment detector 11 and powers the remainder of the tag only when appropriate. Only the signal detector 3 and the transmit enable memory 10 are powered at all times. In the preferred embodiment of the tag almost the entire circuitry is implemented in a single custom-integrated circuit. This makes it possible for the tag to be packaged in a form small enough to have wide application.
The preferred embodiment of the interrogator system is depicted in figure 2. A central computer 40 controls a plurality of interrogators 41, 42, 43, 44 distributed throughout the premises which are being monitored for inventory control. These interrogators are essentially identical in operation in that they consist of a controller/code-generator to generate the appropriate code for transmission, an RF source and a modulation means 46 attached to a transmitting antenna 45. Also they have one or more receivers 47 which receive signals through individual receiving antennas 48, decode the transmission from the tags 20 and pass the relevant data to the central computer. The receivers on all interrogators are at all times "listening" for an alarm signal from any active tag 20. The differences between the interrogators relate to the different ways in which they are used: i) The point-of-sale (POS) interrogators 41 and 42 are equipped with a transmitting antenna 45a which, in conjunction with a low output power level, confines its interrogation range to a localised region at the POS desk. In normal operation it transmits continuously the point-of-sale identification or IDENTIFY code. When an item for sale is brought near to the antenna the tag 20 responds to the transmitted code by transmitting its ID code. Upon receipt of the ID code via antenna 48a and receiver 47a, the interrogator sends the DISABLE code and then resumes transmission of the IDENTIFY command. If the tag 20 continues to respond to the IDENTIFY command after the DISABLE code has been sent by the interrogator, the process is repeated until the DISABLE command takes effect or a failure is registered. When the DISABLE command becomes effective and the tag no longer replies to the IDENTIFY command the ID information is sent to the central computer which notes that the item is about to be sold. The price details are registered on the cash register. A "beeper" indicates to the cashier that all details about the item have been recorded in the central computer and that the tag 20 may be removed safely. If a sale is not completed before the tag is removed, the cashier can ENABLE the tag again and cancel the information at the central computer (or simply record a NO SALE with the information) before restoring the item with its tag to the shop floor.
In order to prevent the tag transmissions in response to the IDENTIFY code from masking detection of an alarm signal, all POS interrogators are synchronised by the control computer such that they trigger the ID code transmissions simultaneously at all points of sale and at roughly half second intervals. Thus there are regular "quiet" periods during which alarm signals can be received reliably.
After a tag has been DISABLED at the POS it may be removed from the item and collected at any convenient point prior to re-use without triggering any alarms.
In the stockroom a version of the POS interrogator is used to ENABLE each tag and identify it after attachment to a new item of stock. At this time the ID number is associated in the central computer with a detailed description of the item, ii) A control-point interrogator is positioned at all access points through which it is desired to detect the carriage of active tags 20. The antenna 45b is thus positioned to localise the transmitted signal to the region and the control-point signal is transmitted continually. In the event of an active tag 20 entering the region, the tag will respond by transmitting its ID code plus a control-point alarm signal, continually. Some receivers 47 in the vicinity will detect the alarm but from the relative strength of the received signal at the receivers in question and the recognition of the alarm as a control-point alarm, the precise location of the potential theft can be determined by the computer. In addition the tag ID is passed to the computer by the interrogators and thus a description of the stolen item is immediately available.
Interrogators installed in a store or warehouse are equipped with sufficient receivers 47 and their associated receiving antennas 48 to adequately cover the entire area to be controlled. In the event of an active tag 20 becoming detached from its item and thus transmitting its ID and detachment alarm signal, one or more receivers 47 at one or more interrogators 41, 42, 43, 44 will receive and demodulate the signal and pass the decoded information to the central computer 40. The central computer will be able to signal to security staff via an appropriate terminal 50 the nature of the alarm and a precise description of the item in question. From the known location of the receivers that received the signal the computer may also indicate the approximate location of the tag.
The central computer 40 maintains the inventory of tags 20 in use, controls the functions of the interrogators 41, 42, 43, 44 and interprets all alarm information for implementation of security functions. TABLE 1
Input Stimulus Transmit enable Tag response Memory state
IDENTIFY signal enabled transmit identification
IDENTIFY signal disabled no action Control-point signal enabled transmit ID code with control-point alarm bit set
Control-point signal disabled no action
Tag ENABLE signal enabled no action
Tag ENABLE signal disabled set transmit enable memory to "enabled" Tag DISABLE signal enabled set transmit enable memory to "disabled"
Tag DISABLE signal disabled no action Tag detachment enabled transmit ID code with detachment alarm bit set
Tag detachment disabled no action

Claims

CLAIMS :
1. A security tag comprising attachment means, alarm sensor means associated with the attachment means to signal when the attachment means is being disconnected from an article to which it was previously attached and transmitter means to generate a radiated signal in response to the alarm means signalling the disconnection of the attachment means from said article.
2. The security tag as claimed in claim 1 wherein the attachment means comprises a conductive loop passing through the article to which it is attached, each end of the loop being electrically connected to respective inputs of an electrical circuit designed to detect changes in the resistance of the loop and to signal an alarm condition in the event of the loop resistance varying outside of predetermined tolerances.
3. The security tag as claimed in claim 1 wherein the alarm means comprises Wiegand wire and a magnet arranged such that their relative positioning must change in order to allow disconnection of the attachment means from the article, and the Wiegand wires being positioned in an electrical circuit to detect a magnetic pulse generated in the Wiegand wire when it is moved in the field of the magnet.
4. The tag as claimed in any one of the preceding claims wherein the tag includes encoding means to encode the radiated signal transmitted by the transmitter means, to enable identification of the tag and hence the article to which it is attached.
5. The tag as claimed in any one of the preceding claims wherein the tag includes receiver means adapted to receive a predetermined radiated signal and to cause the transmitter means to generate its radiated signal in response to the received signal.
6. The tag as claimed in any one of the preceding claims, wherein means are provided for disabling the tag when not in use and re-enabling the tag when required.
7. The tag as claimed in claim 6 wherein the disabling and enabling means comprise a receiver adapted to receive a radiated encoded signal and enabling means incorporating a memory element, the enabling means being responsive to the encoded signal to respectively set and clear the memory element and the operation of the tag being dictated by the state of the memory element.
8. An inventory control system comprising at least one receiver means and a plurality of tags as claimed in any one of the preceding claims, the receiver means being responsive to the radiated signal which can be generated by each of the tags to cause an alarm to be triggered.
9. An inventory control system as claimed in claim 8 wherein the receiver is adapted to decode the signal received from the tags to enable identification of the tags.
10. An inventory control system as claimed in claim 9 wherein the tags include radio controlled enabling and disabling means and a transmitter is provided to selectively transmit enabling and disabling signals to respectively enable or disable individual tags.
11. The inventory control system as claimed in any one of claims 8 to 11 wherein at least one transmitter is provided adjacent to a control point in premises monitored by the system, the tags, when in close proximity to the transmitter, being responsive to a signal transmitted by the transmitter to generate their respective radiated signals which are in turn received by the receiver of the inventory control system, said receiver being located in close proximity to the transmitter.
12. A tag for an inventory control system, substantially as hereinbefore described with reference to the accompanying drawings.
13. An inventory control system substantially as hereinbefore described with reference to the accompanying drawings.
PCT/AU1986/000384 1986-01-03 1986-12-17 Inventory control system WO1987004282A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
AUPH4077 1986-01-03
AUPH407786 1986-01-03

Publications (1)

Publication Number Publication Date
WO1987004282A1 true WO1987004282A1 (en) 1987-07-16

Family

ID=3771429

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/AU1986/000384 WO1987004282A1 (en) 1986-01-03 1986-12-17 Inventory control system

Country Status (3)

Country Link
JP (1) JPS63502697A (en)
AU (1) AU588957B2 (en)
WO (1) WO1987004282A1 (en)

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0311036A2 (en) * 1987-10-07 1989-04-12 TEMIC TELEFUNKEN microelectronic GmbH Surveillance device for articles and or persons
GB2193359B (en) * 1986-07-31 1990-07-11 Multitone Electronics Plc Area communications systems
EP0516713A1 (en) * 1990-02-21 1992-12-09 ISRAEL, Marcia Improved electronic anti-theft merchandise tag
EP0723692A1 (en) * 1993-10-05 1996-07-31 Pac/Scan, Inc. Retail theft prevention and information device
EP0727752A2 (en) * 1995-02-15 1996-08-21 International Computers Limited Electronic identification system
NL1001770C2 (en) * 1995-11-29 1997-05-30 Nedap Nv Deactivatable article monitoring label with data carrier function.
WO1998033155A1 (en) * 1997-01-25 1998-07-30 Philip Noel Leonard Identification or control arrangements
EP0915439A2 (en) * 1997-09-16 1999-05-12 Meto International GmbH Method and device for identfying and deactivating a security tag
EP0933741A2 (en) * 1998-02-03 1999-08-04 KTP Limited A bar code reader and a security tag disabling device in combination
WO1999045512A1 (en) * 1998-03-05 1999-09-10 Siemens Aktiengesellschaft Method for protecting the identity of objects and device for performing the method
WO2000039613A1 (en) * 1998-12-24 2000-07-06 Gemplus Tag Australia Pty Ltd Object and document control system
WO2001045063A1 (en) * 1999-12-15 2001-06-21 Eident Limited Tag
GB2357611A (en) * 1999-12-21 2001-06-27 Ibm Electronic location tag
GB2357612A (en) * 1999-12-21 2001-06-27 Ibm Electronic inventory tag
US6719202B1 (en) * 1998-12-08 2004-04-13 Fujitsu Limited Commodity information management system

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
SE451906B (en) * 1986-02-13 1987-11-02 Intermodulation & Safety Syste ALARM DEVICE CONTAINING ONE OF THE TWO PARTS ALARM CONNECTOR WHICH IN AN ACTIVE EMERGENCY GIVES AN ACOUSTIC SIGNAL AS THE PARTS MOVE OUT OF EACH OTHER
NZ219982A (en) * 1986-04-15 1990-02-26 Bi Inc Personnel monitoring tag transmits verification of presence of flesh
JPH05250374A (en) * 1992-03-05 1993-09-28 Kubota Corp Method and device for managing article

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US3493955A (en) * 1968-04-17 1970-02-03 Monere Corp Method and apparatus for detecting the unauthorized movement of articles
US3500373A (en) * 1966-05-06 1970-03-10 Nat Bank Of North America The Method and apparatus for article theft detection
US3521280A (en) * 1969-01-16 1970-07-21 Gen Res Corp Coded labels
US3665448A (en) * 1970-08-03 1972-05-23 Hugh A Mcglinchey Electronic shoplifting prevention system
US3713133A (en) * 1971-02-16 1973-01-23 R Nathans Rf and sonic systems for preventing shoplifting of goods and unauthorized removal of capsules affixed thereto for protecting goods
US3774205A (en) * 1971-08-02 1973-11-20 Ncr Co Merchandise mark sensing system
US3859652A (en) * 1972-06-26 1975-01-07 North American Systems Corp Method and apparatus for detecting the theft of articles
US4060040A (en) * 1975-05-03 1977-11-29 Friedrich Karl Johnssen Antitheft system for sales areas
AU3712784A (en) * 1983-12-29 1985-07-04 Revlon Inc. Inventory acquisition system
NL8304413A (en) * 1983-12-22 1985-07-16 Nedap Nv Detection system protecting goods in shop from theft - uses two passive signals indicating passage through EM field and active signal also indicating unauthorised removal and discharged battery

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US3500373A (en) * 1966-05-06 1970-03-10 Nat Bank Of North America The Method and apparatus for article theft detection
US3493955A (en) * 1968-04-17 1970-02-03 Monere Corp Method and apparatus for detecting the unauthorized movement of articles
US3521280A (en) * 1969-01-16 1970-07-21 Gen Res Corp Coded labels
US3665448A (en) * 1970-08-03 1972-05-23 Hugh A Mcglinchey Electronic shoplifting prevention system
US3713133A (en) * 1971-02-16 1973-01-23 R Nathans Rf and sonic systems for preventing shoplifting of goods and unauthorized removal of capsules affixed thereto for protecting goods
US3774205A (en) * 1971-08-02 1973-11-20 Ncr Co Merchandise mark sensing system
US3859652A (en) * 1972-06-26 1975-01-07 North American Systems Corp Method and apparatus for detecting the theft of articles
US4060040A (en) * 1975-05-03 1977-11-29 Friedrich Karl Johnssen Antitheft system for sales areas
NL8304413A (en) * 1983-12-22 1985-07-16 Nedap Nv Detection system protecting goods in shop from theft - uses two passive signals indicating passage through EM field and active signal also indicating unauthorised removal and discharged battery
AU3712784A (en) * 1983-12-29 1985-07-04 Revlon Inc. Inventory acquisition system

Cited By (31)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2193359B (en) * 1986-07-31 1990-07-11 Multitone Electronics Plc Area communications systems
US4851815A (en) * 1987-10-07 1989-07-25 Thomas Enkelmann Computer Device for the monitoring of objects and/or persons
EP0311036A3 (en) * 1987-10-07 1991-01-16 TEMIC TELEFUNKEN microelectronic GmbH Surveillance device for articles and or persons
EP0311036A2 (en) * 1987-10-07 1989-04-12 TEMIC TELEFUNKEN microelectronic GmbH Surveillance device for articles and or persons
EP0516713A1 (en) * 1990-02-21 1992-12-09 ISRAEL, Marcia Improved electronic anti-theft merchandise tag
EP0516713A4 (en) * 1990-02-21 1993-02-24 Marcia Israel Improved electronic anti-theft merchandise tag
EP0723692A1 (en) * 1993-10-05 1996-07-31 Pac/Scan, Inc. Retail theft prevention and information device
EP0723692A4 (en) * 1993-10-05 1997-05-28 Pac Scan Inc Retail theft prevention and information device
AU696800B2 (en) * 1995-02-15 1998-09-17 International Computers Limited Electronic identification system
EP0727752A2 (en) * 1995-02-15 1996-08-21 International Computers Limited Electronic identification system
EP0727752A3 (en) * 1995-02-15 1997-05-28 Int Computers Ltd Electronic identification system
US6549119B1 (en) 1995-02-15 2003-04-15 International Computers Limited Electronic identification system
US6181248B1 (en) * 1995-11-29 2001-01-30 N.V. Nederlandsche Apparatenfabriek Nedap Deactivatable article security label with data carrier function
NL1001770C2 (en) * 1995-11-29 1997-05-30 Nedap Nv Deactivatable article monitoring label with data carrier function.
WO1997022085A1 (en) * 1995-11-29 1997-06-19 N.V. Nederlandsche Apparatenfabriek Nedap Deactivatable article security label with data carrier function
AU724795B2 (en) * 1997-01-25 2000-09-28 Philip Noel Leonard Identification or control arrangements
US6329917B1 (en) 1997-01-25 2001-12-11 Philip Noel Leonard Identification or control arrangements
WO1998033155A1 (en) * 1997-01-25 1998-07-30 Philip Noel Leonard Identification or control arrangements
EP0915439A3 (en) * 1997-09-16 1999-12-08 Meto International GmbH Method and device for identfying and deactivating a security tag
EP0915439A2 (en) * 1997-09-16 1999-05-12 Meto International GmbH Method and device for identfying and deactivating a security tag
US6592037B1 (en) 1997-09-16 2003-07-15 Meto International Gmbh Method and device for the detection and deactivation of a deactivatable security element
EP0933741A3 (en) * 1998-02-03 1999-12-08 KTP Limited A bar code reader and a security tag disabling device in combination
EP0933741A2 (en) * 1998-02-03 1999-08-04 KTP Limited A bar code reader and a security tag disabling device in combination
WO1999045512A1 (en) * 1998-03-05 1999-09-10 Siemens Aktiengesellschaft Method for protecting the identity of objects and device for performing the method
US6719202B1 (en) * 1998-12-08 2004-04-13 Fujitsu Limited Commodity information management system
WO2000039613A1 (en) * 1998-12-24 2000-07-06 Gemplus Tag Australia Pty Ltd Object and document control system
WO2001045063A1 (en) * 1999-12-15 2001-06-21 Eident Limited Tag
GB2357611A (en) * 1999-12-21 2001-06-27 Ibm Electronic location tag
GB2357612A (en) * 1999-12-21 2001-06-27 Ibm Electronic inventory tag
US6288645B1 (en) 1999-12-21 2001-09-11 International Business Machines Corp. Electronic location tag
GB2357611B (en) * 1999-12-21 2004-06-02 Ibm Electronic location tag

Also Published As

Publication number Publication date
AU6734587A (en) 1987-07-28
AU588957B2 (en) 1989-09-28
JPS63502697A (en) 1988-10-06

Similar Documents

Publication Publication Date Title
AU588957B2 (en) Inventory control system
EP1382009B1 (en) System and method for controlling remote devices
EP2377076B1 (en) Method and system for item level uhf rfid tag with low frequency power assist
US5955951A (en) Combined article surveillance and product identification system
US5745036A (en) Electronic article security system for store which uses intelligent security tags and transaction data
US5099226A (en) Intelligent security system
US5942978A (en) Wireless transmitter key for EAS tag detacher unit
KR101782437B1 (en) Eas alarming tag with rfid features
EP1625558B1 (en) Eas/rfid identification hard tags
KR100679657B1 (en) Virtually reactivating rfid tags
EP1849144B1 (en) Alarm investigation using rfid
EP2603906B1 (en) Security tag with integrated eas and energy harvesting magnetic element
EP1510985A2 (en) Method and apparatus to detect a plurality of security tags
CA2372756A1 (en) Self-checkout/self-check-in rfid and electronic article surveillance system
US20090189768A1 (en) Combination security tag using a perimeter rfid antenna surrounding an eas element and method thereof
EP2831856B1 (en) System and method for detecting presence of an object
CA2176232A1 (en) Retail theft prevention and information device
KR20180025608A (en) Rfid tag and system for security management using the same
US20070046437A1 (en) Electronic Transmission Device for Activation of Electronic Article Surveillance Systems

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AU JP US

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): AT BE CH DE FR GB IT LU NL SE