摘要:
The invention relates to a method of interrogating a package bearing an RFID tag, and multiple items inside the package each bearing its own RFID tag, the RFID tag associated with the package including information about the RFID tags associated with the multiple items, comprising the steps of: (a) interrogating the RFID tag associated with the package to identify the package and the items in the package; (b) interrogating the RFID tags associated with the items in the package substantially simultaneously to identify the items; and (c) comparing the information obtained in steps (a) and (b) to verify the contents of the package.
摘要:
A security tag assembly and security system associated therewith prevent the unauthorized removal of merchandise from a given area, such as a retail establishment. The security tag assembly comprises a base (12) and at least one attachment member (14) removably connected in an operative position on the merchandise being protected. A locking assembly (24) restricts detachment of the attachment member (14) and is forcibly disposed out of movement restricting relation to said connector member (24) when the base and the attachment member are separated. A detachment assembly and a data registering processor may include a two-way communication link which facilitates processing of the merchandise data disposed on the security tag assembly, such that the purchasing of the merchandise and the removal of the security tag asseinbly can be effectively accomplished without jeopardizing the security of the merchandise being sold.
摘要:
The invention relates to a method for complicating the theft of shopping trolleys (11) which are made available to customers in self-service stores (1). Every shopping trolley (11) is provided with a transponder (12) having the same identification key. At least one monitoring device (14) corresponding with the transponders (12) of the shopping trolleys (11) is provided in at least one suitable position of an exterior area (2) pertaining to the self-service store (1), for example a customer car park (4). The invention is characterized in that, when the shopping trolley (11) passes the monitoring device (14), the monitoring device (14) changes the identification key of the transponder (12) of said shopping trolley (11) to a new identification key. When a shopping trolley (11) having a changed identification key passes a predetermined position (10) inside the self-service store (1), a check device (13) associated with the predetermined position (10) changes the changed identification key back to its original identification key, and the change-back process effected by the check device (13) triggers a signal.
摘要:
The invention relates to a method of interrogating a package bearing an RFID tag, and multiple items inside the package each bearing its own RFID tag, the RFID tag associated with the package including information about the RFID tags associated with the multiple items, comprising the steps of: (a) interrogating the RFID tag associated with the package to identify the package and the items in the package; (b) interrogating the RFID tags associated with the items in the package substantially simultaneously to identify the items; and (c) comparing the information obtained in steps (a) and (b) to verify the contents of the package
摘要:
The invention relates to a method and a device for securing objects that are present in protected spatial areas, whereby the objects to be secured are provided with an identifier or linked with an identifier and said identifier is detected by a receiving unit when the object to be secured is displaced. For this purpose, the receiving unit detects the presence of the identifier and electronic data for proving the presence of the identifier are stored. The electronic data are adapted to allow an unambiguous assignment of the signal detected by the receiving unit to the identifier. Data are detected independently of the detection of the identifier that allow an identification of a person carrying an object to be secured.
摘要:
An electronic security system uses a set of predefined RFID tags (10) each associated with and attached to an article or packaging for an article, and each includes unique tag information which is logged into a computerized database (200) as a record. When a tag is detected in a detection zone by an interrogator (22), the database records are compared to the tag information using a comparator (37) and an appropriate database response is output. When legitimate access to the tagged article is obtained, the tag may be deactivated electronically, physically or virtually.
摘要:
An electronic security system uses a set of predefined RFID tags (10) each associated with and attached to an article or packaging for an article, and each includes unique tag information which is logged into a computerized database (200) as a record. When a tag is detected in a detection zone by an interrogator (22), the database records are compared to the tag information using a comparator (37) and an appropriate database response is output. When legitimate access to the tagged article is obtained, the tag may be deactivated electronically, physically or virtually.
摘要:
The present invention relates to RFID devices, including handheld RFID devices, and applications for such devices. The devices and applications may be used in connection with items that are associated with an RFID tag, and optionally a magnetic security element. The devices and applications are described with particular reference to library materials such as books, periodicals, and magnetic and optical media.
摘要:
The present invention relates to RFID devices, including handheld RFID devices, and applications for such devices. The devices and applications may be used in connection with items that are associated with an RFID tag, and optionally a magnetic security element. The devices and applications are described with particular reference to library materials such as books, periodicals, and magnetic and optical media.