CROSS-REFERENCE TO RELATED APPLICATIONS This continuation application claims the benefit under 35 U.S.C. §120 of application Ser. 11/060,839 filed on Feb. 18, 2005 which in turn claims the benefit under 35 U.S.C. §119(e) of U.S. Provisional A.S.N. 60/546,254 and all of which are entitled SYSTEM AND METHOD FOR AUTHENTICATED DETACHMENT OF PRODUCT TAGS and all of whose entire disclosures are incorporated by reference herein. BACKGROUND OF THE INVENTION 1. Field of Invention This invention relates to generally to product security tags and, more particularly, to a system and method for automatically releasing a security tag. Description of Related Art When attempting to reduce or eliminate shoplifting of store inventory, the use of security tags (also known as anti-theft tags)has been significant in accomplishing this goal. These tags, using various wireless interrogation technologies, such as electromagnetic (EM), acousto-magnetic (AM), radio frequency (RF), etc., are attached to a store item and are interrogated as they pass through an interrogation site (e.g., a pair of field-emitting and signal receiving pedestals) usually located at the store exit. If these tags are not removed from the item, or de-activated, before entering the interrogation site, they will set off an alarm at the interrogation site, thereby alerting store personnel to the theft. With particular regard to the wireless RF technology, the security tags may include a radio frequency identification (RFID) integrated circuit (IC) having a memory that includes data (e.g., product ID information such as a serial number, unique identification number, price, etc.) associated with the store item that the tag is attached to. When the security tag including the RFID IC passes by a reader (e.g., comprising a transmitter/receiver), the RFID IC emits a signal (through a resonant circuit or an antenna) that contains the data associated with the store item. Because this type of security tag emits such particularized data, this type of security tag is also referred to as an “identification tag.” In other instances, a “value-denial” tag is used whereby the security tag is filled with a colored dye. ![]() The tag can only be removed by a cashier who has the proper release tool. If a person leaves the store without having the tag removed by a cashier, if that person attempts to remove the tag himself/herself, the tag harmlessly explodes, thereby destroying the value of the stolen item. However, it should be understood that 70% of store inventory “shrinkage” occurs due to acts by store employees known as “sweethearting.” For example, a cashier may knowingly defeat the security tag by removing it or de-activating it and then not ring up the article for sale. Also, where a valid sale of an item having an security tag attached thereto does occur, the security tag detachment stage usually occurs separate from the UPC barcode stage. Thus, for example, the cashier may scan the UPC barcode on the item which rings up the sale; next, the cashier then needs to place the item into a separate location to effect security tag detachment. 3m edge eg5 user manual makes it easy to find manuals, view and download 3m. Honeywell erx user manual pdf download, view and download honeywell erx user manual online electronic pressure recorder erx security system pdf manual download. Security analysis vinodpcom, notes to ben grahams security analysis 2nd and 3rd. Frequency or global positioning system (GPS) monitoring. Radio frequency systems are used to. Savings, both home confinement and electronic monitoring can save taxpayers, detention facilities, and adjudicated juveniles money. EM programs can range anywhere from $5.50 to $10.00 a day. Offenders under EM and under close manual supervision. This, slows down the purchase process at the point of sale (POS). Thus, there remains a need for preventing such “sweetheart” acts by employees by preventing the cashier from controlling the security tag removal stage. In addition, there also remains a need to make the POS more efficient by combining the sale ring up along with security tag detachment. All references cited herein are incorporated herein by reference in their entireties. BRIEF SUMMARY OF THE INVENTION A system for the automatic detachment of a security tag (e.g., an identification tag) from an article only upon the sale of the article. US5847649A - EAS marker assemblies - Google Patents US5847649A - EAS marker assemblies - Google Patents EAS marker assemblies Info Publication number US5847649A US5847649A US08621272 US62127296A US5847649A US 5847649 A US5847649 A US 5847649A US 08621272 US08621272 US 08621272 US 62127296 A US62127296 A US 62127296A US 5847649 A US5847649 A US 5847649A Authority US Grant status Grant Patent type Prior art keywords markers side assembly according marker release Prior art date 1996-03-25 Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.) Expired - Lifetime Application number US08621272 Inventor William P. Collins Peter J. Zarembo Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.) Bibliotheca RFID Library Systems AG Original Assignee 3M Co Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.) 1996-03-25 Filing date 1996-03-25 Publication date 1998-12-08 Grant date 1998-12-08 Links • • • • • Images • • • Classifications • • G— PHYSICS • G08— SIGNALLING • G08B— SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS • G08B13/00— Burglar, theft or intruder alarms • G08B13/22— Electrical actuation • G08B13/24— Electrical actuation by interference with electromagnetic field distribution • G— Electronic Article Surveillance [EAS], i.e. Systems using tags for detecting removal of a tagged item from a secure area, e.g. Tags for detecting shoplifting • G— Electronic Article Surveillance [EAS], i.e. Systems using tags for detecting removal of a tagged item from a secure area, e.g. Tags for detecting shoplifting characterised by the tag technology used • G— Electronic Article Surveillance [EAS], i.e. Systems using tags for detecting removal of a tagged item from a secure area, e.g. Tags for detecting shoplifting characterised by the tag technology used using ferromagnetic tags • • G— PHYSICS • G08— SIGNALLING • G08B— SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS • G08B13/00— Burglar, theft or intruder alarms • G08B13/22— Electrical actuation • G08B13/24— Electrical actuation by interference with electromagnetic field distribution • G— Electronic Article Surveillance [EAS], i.e. Systems using tags for detecting removal of a tagged item from a secure area, e.g. Tags for detecting shoplifting • G— Tag details • G— Tag layered structure, processes for making layered tags • • G— PHYSICS • G08— SIGNALLING • G08B— SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS • G08B13/00— Burglar, theft or intruder alarms • G08B13/22— Electrical actuation • G08B13/24— Electrical actuation by interference with electromagnetic field distribution • G— Electronic Article Surveillance [EAS], i.e. Systems using tags for detecting removal of a tagged item from a secure area, e.g. Tags for detecting shoplifting • G— Tag details • G— Tag layered structure, processes for making layered tags • G08B13/244— Tag manufacturing, e.g. Continuous manufacturing processes • • G— PHYSICS • G08— SIGNALLING • G08B— SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS • G08B13/00— Burglar, theft or intruder alarms • G08B13/22— Electrical actuation • G08B13/24— Electrical actuation by interference with electromagnetic field distribution • G— Electronic Article Surveillance [EAS], i.e. Systems using tags for detecting removal of a tagged item from a secure area, e.g. Tags for detecting shoplifting • G— Tag details • G— Tag layered structure, processes for making layered tags • G— Tag integrated into item to be protected, e. Get free dragon amulet dragonfable without hacking game. g. Source tagging • • Y— GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS • Y10— TECHNICAL SUBJECTS COVERED BY FORMER USPC • Y10T— TECHNICAL SUBJECTS COVERED BY FORMER US CLASSIFICATION • Y10T156/00— Adhesive bonding and miscellaneous chemical manufacture • Y10T156/10— Methods of surface bonding and/or assembly therefor Abstract. An EAS marker assembly is a packaging and delivery method for large numbers of individual ferromagnetic EAS markers. The assembly is especially suited for use with an automated or semiautomated EAS marker insertion system. The EAS markers have an adhesive layer on each side to allow the markers to be attached between pages of a book. The assembly includes a plurality of markers carried by a differential release liner. The finished assembly can be in either a roll or stack form. When the roll assembly is rolled up, or when a plurality of sheets of markers are assembled in a stack, the easy release side of the differential release liner contacts one of the adhesive layers, and the tight release side of the liner contacts the adhesive layer on the other side of the marker. When the roll assembly is unrolled, or when individual layers are separated from the stack, the easy release side of the differential release liner detaches from its adhesive layer, while the tight release side remains attached to its adhesive layer. Thus, a layer of marker strips on top of a release liner is presented. The differential release liner allows the roll to be unrolled or the individual layers of markers to be separated from the stack while retaining the marker strips in position on the tight release side for automated pick-up and individual release of the strips by an automated insertion system. BACKGROUND Theft of books from libraries is an ever increasing problem. With limited resources, libraries cannot afford to lose any books, much less those relatively rare and valuable books that are essentially irreplaceable. In the commercial setting, bookstores have an obvious requirement to control shoplifting of expensive inventory, which is necessarily displayed openly and accessibly to the patron and the would-be shoplifter.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |