Login| Sign Up| Help| Contact|

Patent Searching and Data


Title:
SELF SERVICE REMOVAL OF SECURITY TAGS
Document Type and Number:
WIPO Patent Application WO/2022/254424
Kind Code:
A1
Abstract:
Embodiments of the current invention relate to a retail system that may be operated by a self-checkout customer to remove and/or disable a security tag. Optionally, the system may enable a buyer to buy a product without the need to conduct the transaction with a store employee. For example, the customer may buy the product over a network using his own personal computing device (e.g., a cellphone). In some embodiments, the product is supplied with a security tag. A self-service tag disabling station may be supplied. For example, each security tag may include an identifier. Once the product is bought, the identifier of the tag is sent to a database. Optionally, a self-service tag disabling station will allow the user to disable and/or remove tags identified in the database as having been sold.

Inventors:
AMTANANI BARAK (IL)
LEVI ORI DAVID (IL)
Application Number:
PCT/IL2022/050562
Publication Date:
December 08, 2022
Filing Date:
May 26, 2022
Export Citation:
Click for automatic bibliography generation   Help
Assignee:
PAYTAG LTD (IL)
International Classes:
E05B73/00; G06K7/10; G06Q20/00; G06Q20/20; G06Q20/32; G08B13/00; G08B13/24
Domestic Patent References:
WO2016201311A12016-12-15
Foreign References:
US20170046707A12017-02-16
US20180374327A12018-12-27
Attorney, Agent or Firm:
LESSOFF, Shimon (IL)
Download PDF:
Claims:
WHAT IS CLAIMED IS:

1. A method for disabling a security tag associated with a retail item comprising: supplying a tag disabling device in communication with an on-line payment system; receiving an on-line payment for the retail item on the on-line payment system; recognizing an identity of the retail item by said tag disabling device; confirming said receiving by a server associated with said on-line payment system to said tag disabling device; activating said tag disabling device in response to said confirming and recognizing.

2. The method of claim 1, further comprising, sending said identity recognized by said tag disabling device to said server.

3. The method of claim 2, wherein said confirming is in response to said sending.

4. The method of claim 1, wherein said recognizing is by reading a label on said security tag.

5. The method of claim 1, further including operating said tag disabling device by a self-service buyer of the retail item.

6. The method of claim 1, wherein said receiving includes: reading said identity from a label on the item using a communication device associated with a customer; opening an on-line selling page for the retail item based on said identity on the communication device.

7. A method for self-service check-out by a buyer comprising: selecting a stock item at a seller establishment; paying for said item to an on-line sale site; confirming of said paying to the seller establishment; releasing of stock item by the seller establishment to the buyer in response to said confirming.

8. The method of claim 7, wherein said confirming includes sending a confirmation from the on-line sale site to the selling establishment.

9. The method of claim 7, wherein said confirming includes sending an electronic token to the buyer and said buyer presenting the electronic token to the seller establishment.

10. The method claim 7, wherein said releasing includes disabling a security tag associated with the stock item.

11. The method of claim 10, wherein said security tag includes a computer readable medium with an identification token and wherein said confirmation includes said identification token.

12. The method of claim 10, wherein said stock item is associated with a computer readable medium with an identification token and wherein said paying includes reading said computer readable medium by a computing device associated with the buyer and sending said identification token to said on-line sale site.

13. The method of claim 10, wherein said paying includes reading said computer readable medium by a computing device associated with the buyer and sending said identification token to said on-line sale site.

14. The method of claim 12, wherein said confirmation includes said identification token.

15. A self-service security tag disabling system comprising: a security tag including an identity label; an on-line sales site; a security tag disabling station including a sensor for reading an identity of an item from said identity label, a communication connection to iu database, a security tag disabling module configured for disabling said security tag in response to recognizing an identity of said identity label and receiving a confirmation of a sale of an item associated with the identity label over said communication connection from said on-line sales site.

16. The system of claim 15, further comprising: an on-line database receiving data on sale of the item from said on-line sales site and sending said data to said security tag disabling module in response to receiving said identity of said item from said tag disabling module.

17. The system of claim 15, further comprising a reader associated with a customer including a sensor for reading said identity from said identity label, a communication connection to said on-line sales site and an application configured for supplying said identity to said on-lines sales site, presenting selling information to said customer and sending customer financial information to said on-line said site to pay for said item.

18. The system of claim 17, wherein said reader includes a cell phone.

Description:
Title: Self Service Removal of Security Tags

RELATED APPLICATION/S

This application claims the benefit of priority under 35 USC §119(e) of U.S. Provisional Patent Application No. 63195072 filed 31 May 2021, the contents of which are incorporated herein by reference in their entirety.

FIELD AND BACKGROUND OF THE INVENTION

The present invention, in some embodiments thereof, relates to a retail system and, more particularly, but not exclusively, a buyer operated security tag disabling system and/or a self-checkout system with shoplifting protection.

Some embodiments of the invention are herein described, by way of example only, with reference to the accompanying drawings. With specific reference now to the drawings in detail, it is stressed that the particulars shown are by way of example and for purposes of illustrative discussion of embodiments of the invention. In this regard, the description taken with the drawings makes apparent to those skilled in the art how embodiments of the invention may be practiced.

SUMMARY OF THE INVENTION

According to an aspect of some embodiments of the invention, there is provided a method for disabling a security tag associated with a retail item including: supplying a tag disabling device in communication with an on-line payment system; receiving an on-line payment for the retail item on the on-line payment system; recognizing an identity of the retail item by the tag disabling device; confirming the receiving by a server associated with the on-line payment system to the tag disabling device; activating the tag disabling device in response to the confirming and recognizing. According to some embodiments of the invention, the method further includes, sending the identity recognized by the tag disabling device to the server.

According to some embodiments of the invention, the confirming is in response to the sending.

According to some embodiments of the invention, the recognizing is by reading a label on the security tag.

According to some embodiments of the invention, the method further includes operating the tag disabling device by a self-service buyer of the retail item.

According to some embodiments of the invention, the receiving includes: reading the identity from a label on the item using a communication device associated with a customer; opening an on-line selling page for the retail item based on the identity on the communication device.

According to an aspect of some embodiments of the invention, there is provided a method for self-service check-out by a buyer including: selecting a stock item at a seller establishment; paying for the item to an on-line sale site; confirming of the paying to the seller establishment; releasing of stock item by the seller establishment to the buyer in response to the confirming.

According to some embodiments of the invention, the confirming includes sending a confirmation from the on-line sale site to the selling establishment.

According to some embodiments of the invention, the confirming includes sending an electronic token to the buyer and the buyer presenting the electronic token to the seller establishment.

According to some embodiments of the invention, the releasing includes disabling a security tag associated with the stock item.

According to some embodiments of the invention, the security tag includes a computer readable medium with an identification token and wherein the confirmation includes the identification token.

According to some embodiments of the invention, the stock item is associated with a computer readable medium with an identification token and wherein the paying includes reading the computer readable medium by a computing device associated with the buyer and sending the identification token to the on-line sale site. According to some embodiments of the invention, the paying includes reading the computer readable medium by a computing device associated with the buyer and sending the identification token to the on-line sale site.

According to some embodiments of the invention, the confirmation includes the identification token.

According to an aspect of some embodiments of the invention, there is provided a self-service security tag disabling system including: a security tag including an identity label; an on-line sales site; a security tag disabling station including a sensor for reading an identity of an item from the identity label, a communication connection to □ database, a security tag disabling module configured for disabling the security tag in response to recognizing an identity of the identity label and receiving a confirmation of a sale of an item associated with the identity label over the communication connection from the on-line sales site.

According to some embodiments of the invention, the system further includes: an on-line database receiving data on sale of the item from the on-line sales site and sending the data to the security tag disabling module in response to receiving the identity of the item from the tag disabling module.

According to some embodiments of the invention, the system further includes a reader associated with a customer including a sensor for reading the identity from the identity label, a communication connection to the on-line sales site and an application configured for supplying the identity to the on-lines sales site, presenting selling information to the customer and sending customer financial information to the on-line the site to pay for the item.

According to some embodiments of the invention, the reader includes a cell phone.

Unless otherwise defined, all technical and/or scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which the invention pertains. Although methods and materials similar or equivalent to those described herein can be used in the practice or testing of embodiments of the invention, exemplary methods and/or materials are described below. In case of conflict, the patent specification, including definitions, will control. In addition, the materials, methods, and examples are illustrative only and are not intended to be necessarily limiting. Unless otherwise defined, all technical and/or scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which the invention pertains. Although methods and materials similar or equivalent to those described herein can be used in the practice or testing of embodiments of the invention, exemplary methods and/or materials are described below. In case of conflict, the patent specification, including definitions, will control. In addition, the materials, methods, and examples are illustrative only and are not intended to be necessarily limiting.

BRIEF DESCRIPTION OF THE SEVERAL VIEWS OF THE DRAWINGiS)

Some embodiments of the invention are herein described, by way of example only, with reference to the accompanying drawings. With specific reference now to the drawings in detail, it is stressed that the particulars shown are by way of example and for purposes of illustrative discussion of embodiments of the invention. In this regard, the description taken with the drawings makes apparent to those skilled in the art how embodiments of the invention may be practiced.

In the drawings:

FIG. l is a block diagram of a retail system in accordance with an embodiment of the current invention;

FIG. 2 is a is a flow chart illustrating a method of tagging an item in accordance with an embodiment of the current invention;

FIG. 3 is a flow chart illustrating a method of purchasing an item in accordance with an embodiment of the current invention;

FIG. 4 is a block diagram illustrating a retail system in accordance with an embodiment of the current invention;

FIG. 5 is a flow chart illustrating a method purchasing an item and disabling a tag according with an embodiment of the current invention;

FIG. 6 is a flow chart illustrating a method of releasing a tag according to an embodiment of the current invention;

FIG. 7 is a schematic illustration illustrating a buzzer and/or security tag and/or ID label according to an embodiment of the current invention;

FIG. 8 is a schematic illustration illustrating a mobile device application according to an embodiment of the current invention; and FIG. 9 is a schematic illustration illustrating a tag label in accordance with an embodiment of current invention;

FIG. 10 is a schematic illustration of a security tag in accordance with an embodiment of the current invention;

FIG. 11A is a schematic illustration of a tag removal station in accordance with an embodiment of the current invention;

FIG. 11B is a schematic close up cut away illustration of a tag removal module of a tag removal station in accordance with an embodiment of the current invention;

FIG. 12 is a schematic illustration of a tag removal actuator in accordance with an embodiment of the current invention;

FIG 13 is a flow chart illustration of a method of identifying a product to a customer in accordance with an embodiment of the current invention;

FIG. 14 is a flow chart illustration of a method of receiving payment for a product in accordance with an embodiment of the current invention;

FIG. 15 is a flow chart illustration of a method of releasing a tag from a product in accordance with an embodiment of the current invention; and

FIG 16 is block diagram of a data flow in a system for self-checkout in accordance with an embodiment of the current invention.

DESCRIPTION OF SPECIFIC EMBODIMENTS OF THE INVENTION

The present invention, in some embodiments thereof, relates to a retail system and, more particularly, but not exclusively, a buyer operated security tag self-disabling system and/or a self-checkout system with shoplifting protection.

OVERVIEW

An aspect of some embodiments of the current invention relates to a retail system that may be operated by a self-checkout customer to disable (e.g., remove) a security tag. Optionally, the system may enable a buyer to buy a product without the need to conduct the transaction with a store employee. The system may help prevent theft of products. For example, the customer may buy the product over a network using his own personal computing device (e.g., a cellphone). For example, each security tag may include an identifier. Once the product is bought, the identifier of the tag is sent to a database. Optionally, a self-service tag disabling station will allow the user to disable and/or remove tags identified in the database.

SPECIFIC EMBODIMENTS

Before explaining at least one embodiment of the invention in detail, it is to be understood that the invention is not necessarily limited in its application to the details of construction and the arrangement of the components and/or methods set forth in the following description and/or illustrated in the drawings and/or the Examples. The invention is capable of other embodiments or of being practiced or carried out in various ways.

FIG. l is a block diagram of a retail system in accordance with an embodiment of the current invention. In some embodiments of the current invention, an item 114 stocked in a store may tagged with a security tag 112. Optionally tag 112 includes an ID label (For example, the labels may include a bar code and/or an NFC chip and/or an RFID chip or any other method). Alternatively or additionally, an ID label may be connected directly to the item 114. Additionally, or alternatively an embodiment may have a database 104 which may store information associating a label (for example the label of the tag 112 and/or another label on the item 114) with a specific item 114 and/or storing information about a status of the item 114 (e.g., whether the labelled item 114 has been sold, whether a security tag 112 on the items as been removed). Optionally the database 104 may be an internet data base and/or it may be on a local server. In some embodiments, a retail system may include a retail interface 106. A user may purchase item 114 in the store by means of the retail interface 106. For example, the retail interface 106 may be on the internet and/or it may be part of a local server. Alternatively, or additionally, an embodiment may include an application that a user may install on their computing device 110 (for example a smart phone). Alternatively, additionally, the retail interface 106 may be accessed by a station in the store. In some embodiments there may be a self-service security tag disabling station 116 (for example for release of the security tag 112 and/or unlocking the tag 112 and/or incapacitating the tag 112). Optionally, the self-service disabling station 116 may be an independent station and/or part of a self-checkout counter. For example, the checkout counter may provide the user access to the retail interface 106 and/or self-service tag removal device 116. Optionally, an application (on a user’s mobile device and/or on one of the store stations) may have a function to scan a product label (for example by using a Bar code reader and/or an NFC chip reader and/or a RFID chip reader). In some embodiments the application may access database 104 of product labels and/or identify the product by its label and/or open for the user a retail page associated with the scanned product. A user may then optionally purchase the product. For example, the purchase may be made using the user’s own computing device 110 and/or the self-checkout counter. For example, by means of a credit card payment. Additionally, or alternatively the retail interface may update the server 102 and/or database 104 on which the item 114 was purchased.

In some embodiments, a product may be fitted with a security tag 112. optionally the security tag 112 may be the same tag as the ID label and/or it may be a separate tag. An embodiment may include a security system that may detect when a security tag 112 and/or a item 114 is brought out of the store. Optionally the security system may detect and/or set off an alarm when a security tag 112 is removed from the store (e.g., a item 114 is removed from the store while still fitted with the security tag 112). Some embodiments may have a station and/or a tag removal device 116 in the store to remove from products the Security tags 112 and/or ID labels (for example, so that item 114 may be removed from the store). Alternatively, or additionally an embodiment may include a security system that may connect to the server 102 and/or database 104 to check if an item 114 was purchased (and/or allow the item 114 to be removed from the store), or to detect if the 114 was not purchased (and/or trigger the alarm when removed from the store). Optionally, the application used by a user on their computing device may be for Android and/or IOS. For example, the application may be installed on a tablet and/or a smartphone.

FIG. 2 is a flow chart illustrating a method in accordance to an embodiment of the current invention. Optionally, a retailer may fit 212 products with security tags and/or ID labels (for example the product may be fitted with a security tag having an ID label). The retailer may then register 204 in the store database that the tag label as connected with the specific product. Alternatively, or additionally the store may have an application that may scan the product label and/or another label on the product and/or may register 204 the product in the data base. (For example: a product may be fitted with a generic bar code for the type of item by a manufacturer, a packager and/or a distributor. An application used by the store may scan the standard bar code of the product and/or scan the specific ID label and/or register 204 in the database that the specific ID number is associated with the type of item.)

FIG. 3 is a flow chart illustrating a method in accordance with an embodiment of the current invention. A customer may choose 320 to buy and/or see information on a product. Optionally the buyer may download and/or open the buyer application on his computing device (for example, he may download and/or open the app from a local server and/or from the internet).

Using the application and/or using scanning functions on the computing device, a buyer may scan 322 the tag ID of the product he wishes to buy and/or see information on (alternatively or additionally, the user may read the tag and/or enter data manually). The app may open a buying interface (for example an online website and/or on a local server) where he may be shown information on the product and/or may be given an option to purchases 306 the object. Once the buyer purchases (e.g., pays) for the item, the buying interface may update 304 the data base (e.g., online database and/or on a local server) that tag number XXXX has been purchased. Optionally in some embodiments, after purchasing an item and/or items, the customer bring 324 the tagged item to a self-service tag disabling station. The station scans the tag and checks 326 the data base. If the tag is marked as sold, the station disables 316 (e.g., removes) the security tag. Disabling 316 the tag may facilitate the customer taking the item out of the store. Optionally, is returned. For example, the tag is placed (atomically and/or by the purchaser) in a tag recovery bin.

In some embodiments, a purchase interface and/or the unlocking system may synchronize with a store data base and/or payment service. For example, a customer may use an application on the customer's a personal computing device such as a smart phone to purchase 306 a product displayed in a store via a network purchasing site. The purchasing site may be synchronized with the unlocking system in the store. For example, store may be in communication with the data base to track the purchasing of items and/or updating inventory automatically. Alternatively, or additionally the application may have a purchasing operation to purchase 306 merchandise. Alternatively, or additionally the system may use a WIFI to connect between a store data base and/or an unlocking system. Alternatively, or additionally the system may have a tag detector that may alert and/or prevent merchandise from being removed from store. For example, after purchasing 306 a product, the customer may be allowed to remove the item from the store without triggering the security system. Alternatively, or additionally the system may use WIFI to connect between a store data base and/or an unlocking system.

FIG. 4 is a block diagram illustrating an embodiment of the current invention. In some embodiments a user may open an app on a reader 410 device, for example, their mobile computing device. Optionally, the reader 410 includes a processor 432 and/or memory 434. For example, the memory 434 may store application data and/or instructions and/or data about products. Optionally, the reader includes and/or has access (e.g., by scanning a credit card of a user) to financial information and/or includes a pay service 436 capable of performing on-line payments. The reader 410, in some embodiments, may include a communication module 438a, for example, a wireless communication hardware and/or software for wireless communication (e.g., Bluetooth, WIFI and/or cellular Internet).

In some embodiments, the app may use a data scanning sensor 430a of the reader 410, for example NFC capabilities of the reader 410. The user optionally may use the sensor to identify the retail item, for example by scanning an ID 440 on the product. Alternatively, or additionally the application may have a function that if the ID 440 was not successfully read by the reader 410, then the user may be instructed to scan again and/or enter data about the produce manually.

In some embodiments, once the item is identified, the application may acquire information on the product. For example, data may be available from a local store server 402 and/or a remote server 402 (e.g., over a network). Optionally, information about the item is presented to the user (for example over a user interface 431 of the reader [e.g., a touch screen and/or a speaker). Optionally, the reader 410 will display to the user to a purchasing page maintained by the server 402. The user may optionally user the reader 410 to purchase and/or acquire and/or pay for the merchandise. The ID number may then be sent to the retailer server. Alternatively, or additionally once a payment is made on a piece of merchandise the server 402 may update the store (for example, the server may be connected via a remote network 438b (e.g., the Internet) and/or a local network 438b (e.g., WIFI, Bluetooth, a wired connection)) to an unlocking station 416 and/or data showing that the item was purchased may be made available to the unlocking station 416.

In some embodiments, the purchaser may bring the item to the unlocking station 416, e.g., in order to disable a security tag 412. The unlocking station 416 may include a sensor 430b (e.g., a barcode reader, and/or an NFC reader and/or RFID reader). The unlocking station 416 may scan the ID 440 and/or check in the server 402 (e.g., online and/or local store server) to see if the item was purchased. Optionally the unlocking station 416 may have a disabler 417 (e.g., an MCU and/or mechanical device) to remove and/or otherwise disable the ID 440 and/or the security device 412 and/or a lock 442 that holds the ID 440 and/or the security device 412 on the produce. Alternatively, or additionally an embodiment of the invention may include a system that may lock the products and/or attaches ID labels and/or Security Tags to the products. Optionally the Locking station and/or machine may be part of the Unlocking station 416 and/or machine. Alternatively, or additionally the unlocking and/or the locking machine and/or station may be separate.

FIG. 5 is a flow chart illustrating a method according to an embodiment of the current invention. Optionally, a purchaser opens 510 an application on a reader device to read 530 an ID of an item that he is considering buying. For example, the application may send 538 the ID to a server of a store and/or of the product supplier and/or an information site to get information about the produce. Optionally, the server checks 526 a database for the ID and/or to identify the object. Optionally, the server may send information about the product to the user and/or may inform the user if the item is not found in a database and/or if there are other problems with the product. Optionally a user may be given an option to enter information on the product, for example, if the product passed expiration date, and/or is damaged, and/or other problems. Optionally, the user is offered the opportunity to pay 506 for the product (e.g., using the reader to pay for the product on-line). The server may optionally update store database 502 that will facilitate the user removing the product from the place of purchase. For example, data from the database my be sent to a tag disabling station allowing the buyer to remove and/or disable a security tag. FIG. 6 is a flow chart illustrating a method according to an embodiment of the current invention. Alternatively, or additionally an embodiment of the current invention may include an unlock station. For example, the unlock station may be connected to the retailer server, for example by Wi-Fi. Optionally an identity tag may be affixed to a piece of merchandise. A user may be required to attach and/or insert and/or bring close an identity/security tag to an unlocking system. The unlocking system may then scan 622 the tag. The ID of the tag is optionally sent 638 so a server. In some embodiments, the server checks 626 the retail server if the merchandise was purchased. For example, if the merchandise was not purchased than the system may instruct the user to scan the tag and/or pay for it. Alternatively, or additionally the system may allow a user to purchase and/or pay for merchandise at the unlocking station. When the server detects that merchandise was paid for and/or purchased the server may authorize disabling 617 a security tag. For example, merchandise may be fitted with a lock and/or security tag and/or the server may authorize the unlocking station removing the tag. Optionally, the lock may be mechanical and/or electronic. Once the unlocking system receives information that the merchandise was paid for and/or purchased, the unlocking station may unlock and/or remove the lock and/or security tag. Optionally, the system may update 604 the server that the lock has been removed and/or may delete the tag and/or ID number from the database. Alternatively, or additionally tags may be collected by the system (for example by the unlocking station) and/or reused on other products.

In some embodiments, the unlocking system may include a user interface, for example, a touch screen, and/or LED panel and/or a control panel, for example, with control buttons. Alternatively, or additionally the unlocking station may include a USB and/or a UART port. For example, for use by a technician. Alternatively or additionally, the unlocking station may be in communication with a personal computing device of the user (e.g., his cellphone) and/or may the user use the cell phone as a user interface to the unlocking station.

Alternatively, or additionally the ID/security tag may include a buzzer that may alert and/or prevent an object from being removed from the vicinity.

FIG. 7 is a schematic illustration illustrating a buzzer and/or security tag 712 with an attached ID label 740 in accordance with an embodiment of the current invention. Optionally, label 740 may include an NFC tag that may be report an ID number. The ID number may be stored in the retailer data base and/or may be associated with an item in the store and/or retailer.

FIG. 8 is a schematic illustration illustrating a reader device 810 and application in accordance with an embodiment of the current invention. In some embodiments, a customer may use his own mobile computing device (e.g., cell phone) as a reader and/or user interface for the buying system of the current invention. Alternatively or additionally, the store may distribute mobile payment devices to users entering the store. For example, the customer may be able to read the ID tag with an application running on the device 810. Optionally, the application may send and/or receive information to and/or from a server and/or a database. For example, the database may return to the mobile device 810 an "Item link" and/or the mobile device 810 may display to the customer item details and/or may provide payment and/or purchasing interface for the item. For example, stored information may include Item Description, and/or Item price, and/or Item picture, and/or Item link for customer review. Optionally a customer may choose to pay, (for example with a safe payment process and/or a credit card system). For example, payment by means of the app. On payment, a confirmation may be saved on the store server (database) for the tag ID. Alternatively or additionally the Server may use a Payment service which may clear the item and the customer facilitating the customer to take the cleared item with him out of the vicinity. For example, the system may give permission to a tag removal device to remove the tag and/or the system may include a way to disable the tag without needing to remove the tag. For example, the security system may be connected and/or may communicate with the store server and/or database to detect which objects being removed from the store were paid for and/or which items were not paid for.

FIG. 9 is a schematic illustration illustrating a tag label 940 in accordance with an embodiment of current invention. A security buzzer tag and/or security tag may be fitted with label 940 such as an NFC tag. Alternatively, or additionally tag may be fitted with an RFID chip which may provide more accurate recognition when trying to leave the store without removing the tag. Optionally, the label 940 may be hidden from a customer. FIG. 10 is a schematic illustration of a security tag 1012 in accordance with an embodiment of the current invention. Alternatively, or additionally the tag 1012 may include an Electronic Article Surveillance (EAS) tag. For example, the tag may include a resonator that sets off an alarm when it is taken through a security zone (for example at an exit from a store). For example, the tag may include an Electro- Magnetic resonator (e.g., based on magneto-harmonic and/or Barkhausen effect), an Acousto-magnetic (e.g., magnetostrictive) device, a Radio Frequency (RFID, e.g., 8.2 MHz) device, a Microwave device, a sign for a Video surveillance system. Optionally, a Concealed EAS Surveillance Systems security ID and/or buzzer may include an electromechanical cover that may allow access to disable the buzzer from the product. Once the server communicates with the unlock station, the MCU of the unlock station may drive the cover (ON\OFF) according to tag status. Alternatively, or additionally the cover may include a mechanical cover. Alternatively, or additionally the security tag and/or buzzer may be firmly connected to the product for example, by way of a needle shaped seal that holds two parts together and/or closed. For example, two parts that may be hard to open by a user unless opened by the unlock station. The secured lock that hinders be opened except by the unlocking station (for example on approval of payment) may help prevent theft. Optionally the unlocking station may also include a locking station and/or may be separate stations and/or systems.

FIG. 11 A is a schematic illustration of a tag removal station 1116 in accordance with an embodiment of the current invention. In some embodiments, the unlocking station may have a tag disabling module 1151. FIG. 11B is a close-up schematic view of an embodiment of a disabling module 1151 in accordance with an embodiment of the current invention. Optionally, module 1151 includes a system to disable a security tag. For example, an electro-mechanical system that may activate a magnet and/or bring a magnet 1153 closer to the tag 1112 and/or deactivate the magnet and/or move the magnet farther away from the security tag 1112 as needed to open and/or close the lock and/or Tag (for example security and/or ID tag).

In some embodiments, a lock may hold a tag 1112 on the merchandise. Optionally, when a tag 1112 is brought into the vicinity of the module 1151, an ID label on the tag 1112 is read by the station 1116 and/or sent to a server for approval. For example, when the server sends a message that the product associated with the ID has been sold and/or a message approving disabling the security tag 1112, a magnet 1153 is activated and/or moved toward a tag location. The magnet 1153 may unlock the lock and/or facilitate removal of the tag 1112 from the merchandise.

FIG. 12 is a schematic illustration of a tag removal actuator 1253 in accordance with an embodiment of the current invention. For example, the actuator 1253 may use a controlled electromagnetic mechanism to unlock and/or lock a security tag, an ID label and/or Buzzer to a merchandise. Alternatively, or additionally the locking and/or unlocking station/s may be designed to function in an indoor location and/or in an outdoor location.

In some embodiments, the unlocking system may detect when multiple items are scanned and/or may refuse to process and/or open the items unless rescanned individually. Alternatively, or additionally the unlocking system may detect and/or require that the merchandise lock be in the unlocking location for the whole unlocking process. For example, this may help prevent a user from activating the unlocking mechanism and switching the paid merchandise with another merchandise that was not paid for to unlock it instead. Alternatively or additionally, the lock and/or ID and/or security labels can be opened and/or closed by other means.

FIG 13 is a flow chart illustration of a method of identifying a product to a customer in accordance with an embodiment of the current invention. In some embodiments, a customer enters a store and sees a product that he wishes to buy. He scans a tag on the product and/or on a shelf and/or he reads a tag and sends the tag ID using a communication device (e.g., a reader, a cell phone etc.) to a server. Optionally the server receives 1338 the ID number and sends 1355 information to the reader. For example, the server may send 1355 a description of the product and/or a link to a site with more information and/or a selling site. Optionally, the server may include an Application Programming Interface (API) endpoint to channel customer requests and/or information and/or there may be security barriers to protect from hostile intruders.

FIG. 14 is a flow chart illustration of a method of receiving payment for a product in accordance with an embodiment of the current invention. In some embodiments, a server may receive 1406 payment electronically from a user device (e.g., a reader based on read from an ID tag and/or sent previously from the reader). For example, the server may be connected to a payment gateway to receive electronic payments. Optionally, data is sent from the payment gateway confirming the payment and/or updating 1402 records in the store and/or in a database. Optionally, various on line databases may be updated 1403. Redundant data may be stored and/or data may also be updated 1403 by independent systems, for example to prevent mistakes and/or abuse. For example, data may be stored and/or updated 1403 on-line and/or in an independent server in an S3 bucket and/or a data log and/or a 3 rd party data bank.

FIG. 15 is a flow chart illustration of a method of releasing a tag from a product in accordance with an embodiment of the current invention. In some embodiments, before taking a newly bought item out of a store, a customer brings the item to a tag disabling station (for example a self-service tag disabling station). For example, the security tag is placed near a sensor and/or a tag disabling module (for example, a customer may bring a bought item to the disabling station before taking the item out from the store). Optionally, the sensor identifies 1530 the tag. For example, the disabling station may be configured to sense the identity of a tag near the disabling module and/or merchandise in the vicinity of the disabling module.

In some embodiments, there may be further identification sensors to verify the identity of the object being released and/or verify that only one object is in the vicinity of the disabling system. For example, a sensor may be supplied to test the weight of a merchandise and/or a camera may sense the color and/or shape and/or size of the merchandise.

In some embodiments, identifying information about a tag and/or product are sent to a server. The server optionally accesses 1535 data whether the item has been sold. For example, the server may include an on-line database and/or a Relational Database Service (RDS). Optionally data may be saved on an on-line and/or virtual storage database. For example, the identifying data of the product may be sent to the RDS and/or the RDS may be supply data from an on-line payment gateway and/or verify if an item was sold and/or paid for. When the item has been sold 1538 the system (e.g., a processor associated with the disabling station) may instruct 1517 the disabling module to disable (e.g., unlock and/or release) the security tag. Optionally, the disabling station may also receive identifying information about a buyer from the server and/or require a user to identify himself, e.g., to make sure that the merchandise is being taken by the correct person, before disabling the tag. Optionally, the disabling station and/or another station may collect the security tag. Once the tag has been disabled, the system may update 1519 its records stating that the merchandise was taken and/or logging the transaction and/or recording that the tag is now invalid and/or to be reassigned. Optionally, the server may include commercial services such as Amazon ® RDS and/or Amazon ® Web Service AWS and/or an online payment service such as paytag ® . The online database 1663 is optionally updated by a payment gateway 1664 and/or includes software packages 1665.

FIG 16 is block diagram of a data flow in a system for self-checkout in accordance with an embodiment of the current invention. In some embodiments, a store database 1620 (e.g., a database controlled by the local store and/or associated with the local store, whether the data be stored on a local memory and/or on-line and/or virtually) may be connected, for example, through an application programming interface API interface 1660 and/or an API gateway 1660 to an on-line database 1663. For example, the on-line database 1663 may be stored on an online server and/or a commercial server (for example Amazon ® S3 and/or an S3 bucket). Optionally, the on-line database 1663 includes software (e.g., including commercial software such as Docker Container ® and/or Amazon ® ECR). Optionally, an endpoint 1666 is accessible to a customer reader device 1610 (for example a cell phone running a buying application). For example, the customer uses the reader device 1610 to read a label (e.g., from a security tag 1612) on a product (e.g., for which he desires information and/or which he desires to buy) and to send the identifying information to the endpoint 1666. The endpoint 1666 optionally accesses data through an RDS 1667 and/or the on-line database 1663 and/or sends information back to the reader 1610 (e.g., the information may include information about the product and/or a link to use to buy the product [e.g., an address of the payment gateway 1664]). The reader 1610 may optionally establish a link and/or send identifying information about the product and/or payment information from the customer to the payment gateway 1664. Optionally analytics 1669 are collected and/or saved to a safe memory and/or log 1670. The analytics 1669 may be used for taxes, inventory, business analysis and/or to prevent fraud.

In some embodiments, the retail store outlet includes a security tag disabling station 1616. Optionally, the station 1616 reads a security tag 1612 and/or send identification information to RDS 1667. The information is optionally used to determine if the item has been sold. The RDS 1667 optionally sends back the information on sale of the item to the disabling station 1616 and/or according to the data from the RDS 1667 the disabling station 1616 disables or refuses to disable the tag 1612.

GENERAL

It is expected that during the life of a patent maturing from this application many relevant building technologies, artificial intelligence methodologies, computer user interfaces, image capture devices will be developed and the scope of the terms for design elements, analysis routines, user devices is intended to include all such new technologies a priori.

As will be appreciated by one skilled in the art, some embodiments of the present invention may be embodied as a system, method or computer program product. Accordingly, some embodiments of the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment (including firmware, resident software, micro-code, etc.) or an embodiment combining software and hardware aspects that may all generally be referred to herein as a “circuit,” “module” or “system.” Furthermore, some embodiments of the present invention may take the form of a computer program product embodied in one or more computer readable medium(s) having computer readable program code embodied thereon. Implementation of the method and/or system of some embodiments of the invention can involve performing and/or completing selected tasks manually, automatically, or a combination thereof. Moreover, according to actual instrumentation and equipment of some embodiments of the method and/or system of the invention, several selected tasks could be implemented by hardware, by software or by firmware and/or by a combination thereof, e.g., using an operating system.

For example, hardware for performing selected tasks according to some embodiments of the invention could be implemented as a chip or a circuit. As software, selected tasks according to some embodiments of the invention could be implemented as a plurality of software instructions being executed by a computer using any suitable operating system. In an exemplary embodiment of the invention, one or more tasks according to some exemplary embodiments of method and/or system as described herein are performed by a data processor, such as a computing platform for executing a plurality of instructions. Optionally, the data processor includes a volatile memory for storing instructions and/or data and/or a non-volatile storage, for example, a magnetic hard-disk and/or removable media, for storing instructions and/or data. Optionally, a network connection is provided as well. A display and/or a user input device such as a keyboard or mouse are optionally provided as well.

Any combination of one or more computer readable medium(s) may be utilized for some embodiments of the invention. The computer readable medium may be a computer readable signal medium or a computer readable storage medium. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any suitable combination of the foregoing. More specific examples (a non-exhaustive list) of the computer readable storage medium would include the following: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a random access memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or Flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the context of this document, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.

A computer readable signal medium may include a propagated data signal with computer readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated signal may take any of a variety of forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device.

Program code embodied on a computer readable medium and/or data used thereby may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing. Computer program code for carrying out operations for some embodiments of the present invention may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, Smalltalk, C++ or the like and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the latter scenario, the remote computer may be connected to the user's computer through any type of network, including a local area network (LAN) and/or a mesh network (meshnet, emesh) and/or a wide area network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet Service Provider).

Some embodiments of the present invention may be described below with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the invention. It will be understood that each block of the flowchart illustrations and/or block diagrams, and combinations of blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks.

These computer program instructions may also be stored in a computer readable medium that can direct a computer, other programmable data processing apparatus, or other devices to function in a particular manner, such that the instructions stored in the computer readable medium produce an article of manufacture including instructions which implement the function/act specified in the flowchart and/or block diagram block or blocks.

The computer program instructions may also be loaded onto a computer, other programmable data processing apparatus, or other devices to cause a series of operational steps to be performed on the computer, other programmable apparatus or other devices to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide processes for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks.

Some of the methods described herein are generally designed only for use by a computer, and may not be feasible or practical for performing purely manually, by a human expert. A human expert who wanted to manually perform similar tasks might be expected to use completely different methods, e.g., making use of expert knowledge and/or the pattern recognition capabilities of the human brain, which would be vastly more efficient than manually going through the steps of the methods described herein.

Data and/or program code may be accessed and/or shared over a network, for example the Internet. For example, data may be shared and/or accessed using a social network. A processor may include remote processing capabilities for example available over a network (e.g., the Internet). For example, resources may be accessed via cloud computing. The term “cloud computing” refers to the use of computational resources that are available remotely over a public network, such as the internet, and that may be provided for example at a low cost and/or on an hourly basis. Any virtual or physical computer that is in electronic communication with such a public network could potentially be available as a computational resource. To provide computational resources via the cloud network on a secure basis, computers that access the cloud network may employ standard security encryption protocols such as SSL and PGP, which are well known in the industry.

As used herein the term “about” refers to ± 10%

The terms "comprises", "comprising", "includes", "including", “having” and their conjugates mean "including but not limited to".

The term “consisting of’ means “including and limited to”.

The term "consisting essentially of means that the composition, method or structure may include additional ingredients, steps and/or parts, but only if the additional ingredients, steps and/or parts do not materially alter the basic and novel characteristics of the claimed composition, method or structure. As used herein, the singular form "a", "an" and "the" include plural references unless the context clearly dictates otherwise.

Throughout this application, various embodiments of this invention may be presented in a range format. It should be understood that the description in range format is merely for convenience and brevity and should not be construed as an inflexible limitation on the scope of the invention. Accordingly, the description of a range should be considered to have specifically disclosed all the possible subranges as well as individual numerical values within that range. For example, description of a range such as from 1 to 6 should be considered to have specifically disclosed subranges such as from 1 to 3, from 1 to 4, from 1 to 5, from 2 to 4, from 2 to 6, from 3 to 6 etc., as well as individual numbers within that range, for example, 1, 2, 3, 4, 5, and 6. This applies regardless of the breadth of the range.

Whenever a numerical range is indicated herein, it is meant to include any cited numeral (fractional or integral) within the indicated range. The phrases “ranging/ranges between” a first indicate number and a second indicate number and “ranging/ranges from” a first indicate number “to” a second indicate number are used herein interchangeably and are meant to include the first and second indicated numbers and all the fractional and integral numerals therebetween.

It is appreciated that certain features of the invention, which are, for clarity, described in the context of separate embodiments, may also be provided in combination in a single embodiment. Conversely, various features of the invention, which are, for brevity, described in the context of a single embodiment, may also be provided separately or in any suitable subcombination or as suitable in any other described embodiment of the invention. Certain features described in the context of various embodiments are not to be considered essential features of those embodiments, unless the embodiment is inoperative without those elements.

Although the invention has been described in conjunction with specific embodiments thereof, it is evident that many alternatives, modifications and variations will be apparent to those skilled in the art. Accordingly, it is intended to embrace all such alternatives, modifications and variations that fall within the spirit and broad scope of the appended claims.

All publications, patents and patent applications mentioned in this specification are herein incorporated in their entirety by reference into the specification, to the same extent as if each individual publication, patent or patent application was specifically and individually indicated to be incorporated herein by reference. In addition, citation or identification of any reference in this application shall not be construed as an admission that such reference is available as prior art to the present invention. To the extent that section headings are used, they should not be construed as necessarily limiting.