WO2015092375A1 - Système et procédé de sécurité - Google Patents
Système et procédé de sécurité Download PDFInfo
- Publication number
- WO2015092375A1 WO2015092375A1 PCT/GB2014/053699 GB2014053699W WO2015092375A1 WO 2015092375 A1 WO2015092375 A1 WO 2015092375A1 GB 2014053699 W GB2014053699 W GB 2014053699W WO 2015092375 A1 WO2015092375 A1 WO 2015092375A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- data
- image
- eas
- management component
- tag
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 26
- 238000013523 data management Methods 0.000 claims abstract description 57
- 230000004913 activation Effects 0.000 claims abstract description 24
- 230000001815 facial effect Effects 0.000 claims description 6
- 238000001514 detection method Methods 0.000 claims description 4
- 238000012544 monitoring process Methods 0.000 claims description 2
- 230000001960 triggered effect Effects 0.000 description 5
- 238000004458 analytical method Methods 0.000 description 3
- 238000004806 packaging method and process Methods 0.000 description 3
- 238000012552 review Methods 0.000 description 3
- 230000000007 visual effect Effects 0.000 description 3
- 230000006399 behavior Effects 0.000 description 2
- 230000003213 activating effect Effects 0.000 description 1
- 239000000853 adhesive Substances 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000008901 benefit Effects 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 238000010276 construction Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000003203 everyday effect Effects 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 238000012384 transportation and delivery Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/22—Electrical actuation
- G08B13/24—Electrical actuation by interference with electromagnetic field distribution
- G08B13/2402—Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting
- G08B13/2465—Aspects related to the EAS system, e.g. system components other than tags
- G08B13/248—EAS system combined with another detection technology, e.g. dual EAS and video or other presence detection system
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/22—Electrical actuation
- G08B13/24—Electrical actuation by interference with electromagnetic field distribution
- G08B13/2402—Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting
- G08B13/2405—Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting characterised by the tag technology used
- G08B13/2414—Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting characterised by the tag technology used using inductive tags
- G08B13/2417—Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting characterised by the tag technology used using inductive tags having a radio frequency identification chip
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/22—Electrical actuation
- G08B13/24—Electrical actuation by interference with electromagnetic field distribution
- G08B13/2402—Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting
- G08B13/2451—Specific applications combined with EAS
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/18—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
- G08B13/189—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
- G08B13/194—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
- G08B13/196—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
- G08B13/19665—Details related to the storage of video surveillance data
- G08B13/19676—Temporary storage, e.g. cyclic memory, buffer storage on pre-alarm
Definitions
- the present invention relates to a security system and method for detecting theft of items from a retail store or similar environment.
- the invention relates to a system and method that transmits images of an alleged shoplifter to a control centre when the system is triggered by a tagged item leaving the store, allowing users of the system to build a database of possible repeated offenders.
- b. Related Art It is known to tag items in a retail store to deter or prevent theft of those items. Security tags are often applied to high value goods or those that are targeted by thieves.
- the security tags may be in the form of hard tags that are pinned to or wrapped around a product, or soft tags such as labels that may be adhered to a box or other packaging.
- the security tag is detached or deactivated at the checkout so that the product can be removed from the shop without triggering an alarm. If a person tries to remove an item without the security tag having been deactivated, as the tag passes through or by a verifier an alarm will be activated. Verifiers are typically installed in gates or pedestals at the store entrance and exit such that it is necessary to walk pass the verifier as a person exits the store. If the tag has not been deactivated an audible alarm is typically sounded, accompanied by flashing lights or other visual signal.
- a security system for a retail store comprising:
- EAS electronic article surveillance
- a detector module comprising an EAS detector, the detector module being configured to transmit an activation signal when an EAS tag is detected by said detector;
- an image capture component comprising a camera arranged to image an area proximate the EAS detector, the image capture component being configured to receive the activation signal and to capture image data from the camera; and - a data management component comprising a memory, the data management component being configured to receive image data transmitted by the image capture component, wherein, in use, upon receipt of the activation signal the image capture component is configured to capture image data and to transmit said image data to the data management component, and
- the detector module comprises means for capturing product data associated with said detected tag and means for transmitting said product data to the data management component
- the data management component is configured to link said product data with the image data to create an incident record and to store said incident record in the memory
- the data management component comprises means for linking incident records based on said product data and/or said image data.
- the EAS tags are preferably radio frequency identification (RFID) tags and the EAS detector is preferably an RFID detector.
- RFID radio frequency identification
- the camera is a video camera and the image capture component is configured to capture image data comprising at least one frame of video. Upon receipt of the activation signal the image capture component is preferably configured to capture image data comprising a frame of the video, a predetermined number of frames preceding said frame and a predetermined number of frames following said frame.
- the data management component is configured to link event data comprising a time at which the tag is detected to said incident record.
- the event data may also comprise a date and/or a location of the tag detection.
- the data management component may further comprise means for linking incident records based on said event data.
- the data management component preferably comprises display means and input means allowing the image data to be analysed and/or manipulated by a user.
- the image data comprises more than one frame of video
- said images are displayed on the display means and the input means is configured to receive an input from a user selecting a single one of said frames of video.
- the data management component may further comprise facial recognition software. This enables several images to be analysed and compared to determine repeat offenders.
- the facial recognition software is preferably configured to compare image data stored in said memory and to determine if more than one image shows the same person, and the data management component preferably further comprises means for linking incident records containing said images showing the same person.
- the EAS detector and the camera will be located proximate an exit of said retail store.
- the system in a retail store having more than one exit, preferably comprises an EAS detector and a camera located proximate each of said exits.
- the detector module preferably comprises more than one EAS detector which may be, for example placed on either side of an exit.
- Each of the EAS detectors in said detector module is preferably configured to transmit an activation signal to a single image capture component.
- the data management component is configured to link location data to said image data, the location data comprising an indication of which one of said EAS detectors detected the tag. The location data will typically be transmitted by the verifier to the data management component. Alternatively the location data may be transmitted from the image capture component to the data management component.
- a method of monitoring thefts of items from a retail store each of said items having an electronic article surveillance (EAS) tag attached thereto, and each of said tags being programmed with product data about said item, the method comprising: detecting said EAS tag using an EAS detector and capturing product data associated with said detected tag; upon detection of said tag, transmitting an activation signal to an image capture component;
- EAS electronic article surveillance
- the image capture component upon receipt of the activation signal, the image capture component capturing image data from a camera arranged to image an area proximate the EAS detector;
- the EAS tag is preferably an RFID tag and the EAS detector is preferably an RFID detector.
- the camera is a video camera and the method comprises capturing image data from said video camera comprising at least one frame of a video. More preferably the image capture component saves image data comprising a frame of the video, a predetermined number of frames preceding said frame and a predetermined number of frames following said frame.
- the data management component comprises display means and input means
- the image data comprises more than one frame of video
- the method further comprises:
- the method further comprises linking event data with the incident record, the event data comprising a time at which the tag was detected.
- the event data may also comprise a date on which the tag was detected.
- the event data may be transmitted from the verifier or the image capture component to the data management component.
- the method preferably further comprises linking two or more incident records based on said event data.
- the method preferably further comprises linking location data with the image data.
- the location data preferably comprises a location of the EAS detector that detected the tag.
- Figure 1 is a schematic drawing of a preferred embodiment of a security system of the present invention.
- Figure 2 is a flow chart illustrating the steps in one embodiment of a method of use of the security system of Figure 1 .
- a security system 10 will, typically, be installed in a retail environment such as a retail store.
- the system 10 is arranged to detect items being removed from the store illegally and to provide images of the suspected thief to security personnel. If the suspected thief is a repeat offender, i.e. is suspected of taking items from the store on more than one occasion, the system enables a record of their activities over time to be stored and analysed, allowing security personnel to determine patterns in behaviour.
- the security intelligence provided by the security system 10 results in more targeted actions by the security personnel, leading to the detention of the suspected thief and a greater likelihood of prosecution, due to the evidence provided by the system and the confidence with which the thief can be approached.
- a preferred embodiment of the security system 10, as illustrated in Figure 1 comprises a plurality of security tags 12, each one being attached to an item of stock 14 within the store, a tag reader or verifier 16, a camera 18, and a memory 20 for storing images 22 captured by the camera 18.
- the removal of a tagged item 14, which has not been deactivated, from the store is detected by the verifier 16 and the verifier 16 sends a signal to the camera 18 which is activated to capture one or more images 22.
- This image or set of images 22 is then transmitted to a central memory 20 to be analysed by security personnel.
- the system 10 is preferably arranged such that the verifier 16 and the camera 18 are located at or proximate an exit of the store such that the camera 18 captures images of the person removing the item as they leave the store.
- the system 10 is discrete such that, at the time of leaving the store with the tagged item 14, the person is unaware that they have triggered the security system 10. This allows the security personnel to monitor the person for a period of time without raising suspicion.
- the verifier 16 does not include any audible or visual alarm. It will be appreciated, however, that in some embodiments the verifier 16 may include one or both of an audible and visual alarm.
- the alarm may be configured so that it can be switched on and off by a user of the system. In this way, the alarm can be deactivated if it is desired to be able to trigger the security system without alerting the suspected thief.
- the security tags 12 will typically comprise electronic article surveillance (EAS) tags.
- EAS electronic article surveillance
- the tags 12 that are attached to the items of stock 14 in the store are radio frequency identification (RFID) tags or labels.
- RFID radio frequency identification
- the advantage of these RFID labels is that they are easy to apply and do not have to be removed from the product when it is purchased. Instead, the RFID tags 12 are simply deactivated so that they do not trigger the alarm by passing the label over a suitable deactivator, as is known in the art.
- the labels may be plain or printed with any desirable lettering or graphic, such that it may not be obvious that the item 14 has any form of security device attached to it, or the tags may be hidden inside the product packaging at source. In other embodiments the labels may be in the form of hard tags that are removed from the product when the product is purchased.
- RFID labels A number of types of RFID labels are well known in the art and their construction and operation will not be described in detail here. Importantly, however, the RFID labels will be programmed with information to identify the type of product to which it is attached. While the product is in the store, this information is used for stock control and allows the store owner or manager to know exactly what stock is being sold and what stock remains.
- stock on shelves in a store may be checked by passing an RFID scanner along the row of products 14 to scan the tags 12.
- This information can be transmitted to a central stock control system which monitors stock levels and determines when new stock needs to be ordered.
- a reader or rewriter at the checkout reads the RFID tag and transmits the product information to the stock control system to indicate that that item has been purchased.
- the reader or rewriter also deactivates the RFID tag so that the tag does not activate the store's security system when the customer leaves the store.
- a reader may determine that a product with a specified unique code has passed through the checkout and suitable software will prevent that tag triggering the alarm.
- a rewriter may change the code held within the tag so that the alarm is not triggered.
- the store is also able to determine, and keep a record of, which items 14 have been removed from the store without the tag 12 having been deactivated, i.e.
- the security system 10 of the present invention also utilises the product information stored in the RFID label 12.
- the verifier 16 of the security system 10 is able to extract this product information when an RFID tag 12 is detected.
- the security system 10 further comprises at least one RFID verifier 16 positioned at the exit of the store.
- the verifier 16 will typically be in the form of a reader and antenna, as is known in the art.
- the verifier 16 is preferably ceiling mounted or wall mounted so that it does not obstruct the movement of people in and out of the store. In some situations, however, the verifier 16 may be located in pedestals or gates located at the exit, between which customers pass as they leave the store. In other stores the verifier 16 may be discretely located above a ceiling, within a door frame or in the floor, so that there is no visible security system which would otherwise detract from the look and feel of the store environment.
- two or three verifiers 16 are located at the store exit so that customers leaving the store pass close enough to at least one of the verifiers 16 to enable the verifier 16 to detect any RFID tags 12 on products 14 the customer may be carrying.
- the verifier 16 is configured to capture the product information stored on the tag 12 and to transmit an activation signal to a camera 18 mounted proximate the exit.
- the camera 18, which is preferably a video camera and which may be a standard closed circuit television (CCTV) camera, is located at or proximate the exit of the store and is arranged such that the camera 18 captures images of customers exiting the store.
- the camera 18 is, therefore, positioned to point in a direction substantially into the store so as to capture pictures of customers' faces.
- the camera 18 may be one of the store's regular CCTV cameras, or alternatively may be a dedicated, stand-alone camera linked to the security system 10 of the present invention.
- the camera 18 is part of an image capture component 24 of the security system 10, which further comprises a memory for storing image data, control means for controlling functions of the camera 18 and means for receiving and transmitting data.
- data is received and transmitted wirelessly by the image capture component 24.
- the image capture component 24 is configured to receive the activation signal transmitted by the verifier 16.
- the activation signal is ideally sent wirelessly from the verifier 16 to the image capture component 24, a wired connection may alternatively be provided between these two components.
- the camera 18 is continuously capturing video data comprising images of the exit of the store.
- the control means Upon receipt of the activation signal by the image capture component 24, the control means saves a frame of the video as an image file in the memory.
- the control means may additionally save a pre-determined number of frames preceding and following the current frame, with the aim of capturing a clear image of the person leaving the store with the tagged item 14.
- the control means saves the preceding three frames and the following three frames, such that a set of seven frames are stored as a set of separate image files 22.
- the saved set of frames is then transmitted to a data management component 26 of the security system 10.
- the data management component 26 will typically comprise a remote computer or workstation 28 and may include a computer that is linked to the store's existing CCTV system.
- the data management component may comprise a tablet computer or a smart phone.
- the data management component 26 comprises a means for receiving data from the image capture component 24 and a memory 20.
- the memory 20 may comprise a database for storing image files 22.
- the data management component 26 preferably also comprises display means 30 for displaying the image files 22, and input means 32, for example a mouse or a keyboard, for receiving inputs from a user of the system 10.
- the display means 30 and input means 32 may be a single device such as a touch screen.
- the set of frames may be displayed immediately on the display device 30 for review by the user of the system 10.
- the set of unprocessed images may be saved in the memory 20 for display at a later time.
- a user reviews the set of frames and, using the input means 32, selects a single frame that most clearly displays the person exiting the store. This selected frame is then stored in the memory 20 and the remainder of the images in the set of frames are deleted or discarded. In other embodiments, all of the images of the processed set of frames may be saved in the memory 20, with the selected image being tagged or indexed to allow this image in particular to be retrieved at a later time.
- the selected image or processed set of images is saved together with other data from the RFID tag 12 and the verifier 16, to create an incident record.
- This data may include, for example, product data including the type of product that has been removed from the store, as well as the date and time at which the verifier 16 detected the tag 12.
- This additional data may be transmitted from the verifier 16 to the image capture component 24 together with the activation signal, and then subsequently transmitted to the data management component 26 from the image capture component 24 with the images 22.
- the data may be transmitted directly from the verifier 16 to the data management component 26 and then subsequently linked to the image data from the image capture component 24.
- the data management component 26 additionally comprises means for receiving data directly from the verifier 16.
- the means for receiving data from the image capture component 24, and the means for receiving data from the verifier 16 if present, preferably comprises a wireless data receiver. In some embodiments, however, a wired connection between the image capture component 24 and the data management component 26, and between the verifier 16 and the data management component 26, may be provided for the transmission of data.
- the data management component 26 further comprises facial recognition software that can compare the selected image or each image from the complete set of images 22 to previous images stored in the memory 20. This allows the system 10 to determine if the same person has previously been detected removing items from the store. If the software does find one or more images showing the same person, these incident records can be linked in the memory 20. It may be preferable if an initial link is formed between the images until a user of the system 10 has verified that the images show the same person. A confirmed link can then be established between the images or the incident records. It will be appreciated that the identification and linking steps may both be carried out manually by, for example, security personnel operating the system 10.
- the facial recognition software monitors a video stream from a CCTV camera showing persons entering the store.
- the system 10 may then be configured to trigger an alert when a person who has been identified in images 22 stored in the memory 20 enters the store.
- the security personnel may then follow this person either on the ground or by using CCTV cameras to monitor their actions within the store.
- the system may include processing means for determining patterns in the data and/or incident records.
- the processing means may alert a user if the data shows that the same type of product is being taken from the store on the same day of the week or at the same time of day on more than one occasion. A user may then choose to view or tag all incident records created on that day of the week or at that time of day to determine if those thefts are linked.
- many retail stores there is more than one entrance and exit.
- the security system 10 of the present invention preferably includes one or more verifiers 16 and one or more associated cameras 18 or image capture components 24 at each of the entrances and exits.
- the data from each of the verifiers 16 and image capture components 24 is sent back to the data management component 26 for analysis and compilation. Because, in these embodiments, the data from numerous sources are compiled in a central memory 20, the data transmitted by the verifier 16 and/or the image capture component 24 preferably includes information as to which verifier 16 and camera 18 have been activated. With this system, therefore, the security personnel are able to determine through which exit the person left the store.
- the security or electronic article surveillance (EAS) tag 12 was an RFID label and the verifier 16 was an RFID verifier, it will be appreciated that, in other embodiments of the invention, the tags 12 and the verifiers 16 may comprise a different type of electronic article surveillance system.
- the tags 12 may be magnetic tags, acousto-magnetic (AM) tags or a tag incorporating a microwave-based system.
- AM acousto-magnetic
- Figure 2 illustrates the steps in a method of detecting theft from a retail store using the security system 10 described above.
- a non-deactivated tag 12 is detected by a verifier 16 at an exit of the store.
- the verifier 16 transmits an activation signal to the image capture component 24 associated with that verifier 16, i.e. located at the same exit.
- Receipt of the activation signal causes the control means of the image capture component 24 to capture and save one or more frames of video recorded by the camera 18 at step 44.
- the captured image or images are then transmitted to the data management component 26 at step 46.
- the verifier 16 captures the product data stored on that tag 12 at step 48. This product data is then also transmitted to the data management component 26 at step 50. The location of the verifier within the store, and the date and time at which the tag was detected may also be transmitted, in the form of location and event data, to the data management component 26, together with the product data.
- software associates or links the product data to the image data to create a linked incident record. This incident record is then saved in the memory 20 for review by security personnel at step 54.
- the image data and product data may be transmitted to a further data management system located off site.
- This remote data management system is then used to analyse the captured data and the results of this analysis are then transmitted back to the retail store.
- the remote data management system may, for example, be located at a head office of a chain of retail stores.
- the present invention therefore, provides an improved security system and method that allows security personnel to detect and monitor thefts, thereby providing a means to target repeat offenders.
Landscapes
- Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- Automation & Control Theory (AREA)
- Computer Security & Cryptography (AREA)
- Electromagnetism (AREA)
- General Physics & Mathematics (AREA)
- Multimedia (AREA)
- Burglar Alarm Systems (AREA)
Abstract
La présente invention concerne un système et un procédé de sécurité destinés à détecter un vol d'articles dans un magasin de vente au détail ou dans un environnement similaire. Le système de sécurité destiné à un magasin de vente au détail comprend plusieurs étiquettes de surveillance électronique d'article (EAS), chaque étiquette étant programmée avec des données de produit ; un module détecteur comprenant un détecteur d'EAS, le module détecteur étant conçu pour transmettre un signal d'activation lors de la détection d'une étiquette d'EAS ; un composant de capteur d'image comprenant une caméra disposée pour mettre en image une zone proche du détecteur d'EAS, le composant de capture d'image étant conçu pour recevoir le signal d'activation et pour capturer des données d'image de la caméra ; et un composant de gestion de données étant conçu pour recevoir des données d'image transmises par le composant de capture d'image. Selon l'invention, lors de l'utilisation, lors de la réception du signal d'activation, le composant de capture d'image capture des données d'image et transmet lesdites données d'image au composant de gestion de données, et le module détecteur comprend un moyen destiné à capturer des données de produit associées à ladite étiquette détectée et un moyen destiné à transmettre lesdites données de produit au composant de gestion de données, et le composant de gestion de données est conçu pour lier lesdites données de produit aux données d'image et pour mémoriser lesdites données liées dans la mémoire.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GB1322232.8A GB2521231A (en) | 2013-12-16 | 2013-12-16 | Security system and method |
GB1322232.8 | 2013-12-16 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2015092375A1 true WO2015092375A1 (fr) | 2015-06-25 |
Family
ID=50030994
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/GB2014/053699 WO2015092375A1 (fr) | 2013-12-16 | 2014-12-15 | Système et procédé de sécurité |
Country Status (2)
Country | Link |
---|---|
GB (1) | GB2521231A (fr) |
WO (1) | WO2015092375A1 (fr) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
ITUA20162542A1 (it) * | 2016-04-13 | 2017-10-13 | Extreme Flight Fze | Sistema per rilevare e misurare la permanenza di una persona all'interno di un'area, in particolare una galleria del vento, e relativo metodo. |
CN117057372B (zh) * | 2023-10-13 | 2024-01-26 | 深圳市国芯物联科技有限公司 | 一种基于射频识别技术的多目标识别方法 |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10902376B2 (en) | 2017-11-06 | 2021-01-26 | Microsoft Technology Licensing, Llc | Inventory control |
WO2024196660A1 (fr) * | 2023-03-17 | 2024-09-26 | Checkpoint Systems, Inc. | Systèmes et procédés de suivi de prévention de perte |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2004034347A1 (fr) * | 2002-10-11 | 2004-04-22 | Geza Nemes | Systeme de securite et procede de surveillance et de controle du deplacement des personnes et des marchandises |
US20090128334A1 (en) * | 2007-11-16 | 2009-05-21 | Intermec Ip Corp. | RFID Tag Reader Station With Image Capabilities |
WO2013025167A2 (fr) * | 2011-08-16 | 2013-02-21 | Tamperseal Ab | Procédé et système permettant de surveiller la manipulation d'un objet |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8094026B1 (en) * | 2011-05-02 | 2012-01-10 | Robert M Green | Organized retail crime detection security system and method |
-
2013
- 2013-12-16 GB GB1322232.8A patent/GB2521231A/en not_active Withdrawn
-
2014
- 2014-12-15 WO PCT/GB2014/053699 patent/WO2015092375A1/fr active Application Filing
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2004034347A1 (fr) * | 2002-10-11 | 2004-04-22 | Geza Nemes | Systeme de securite et procede de surveillance et de controle du deplacement des personnes et des marchandises |
US20090128334A1 (en) * | 2007-11-16 | 2009-05-21 | Intermec Ip Corp. | RFID Tag Reader Station With Image Capabilities |
WO2013025167A2 (fr) * | 2011-08-16 | 2013-02-21 | Tamperseal Ab | Procédé et système permettant de surveiller la manipulation d'un objet |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
ITUA20162542A1 (it) * | 2016-04-13 | 2017-10-13 | Extreme Flight Fze | Sistema per rilevare e misurare la permanenza di una persona all'interno di un'area, in particolare una galleria del vento, e relativo metodo. |
WO2017178922A1 (fr) * | 2016-04-13 | 2017-10-19 | Extreme Flight Fze | Système de détection et de mesure de la durée d'un individu à l'intérieur d'une zone, en particulier une soufflerie, et procédé associé |
CN117057372B (zh) * | 2023-10-13 | 2024-01-26 | 深圳市国芯物联科技有限公司 | 一种基于射频识别技术的多目标识别方法 |
Also Published As
Publication number | Publication date |
---|---|
GB201322232D0 (en) | 2014-01-29 |
GB2521231A (en) | 2015-06-17 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10817710B2 (en) | Predictive theft notification | |
US9135499B2 (en) | Predictive theft notification for the prevention of theft | |
AU2006287940B2 (en) | Object tracking and alerts | |
US9472072B2 (en) | System and method of post event/alarm analysis in CCTV and integrated security systems | |
US20200211343A1 (en) | Video analytics system | |
US8773266B2 (en) | RFID tag reader station with image capabilities | |
CA2265907C (fr) | Systeme de securite electronique pour articles, pour magasin utilisant un systeme intelligent de labels de securite et de donnees de transaction | |
US20080246613A1 (en) | System and method for wireless security theft prevention | |
US20140362223A1 (en) | Theft Deterrent System at Product Display Area with Targeted Advertising | |
TW202244857A (zh) | 監視系統 | |
CN106463028A (zh) | 试衣间管理和占用监视系统 | |
US20100007738A1 (en) | Method of advanced person or object recognition and detection | |
JP2008203974A (ja) | 盗難防止システム、盗難防止方法およびプログラム | |
JP2008257487A (ja) | 顔認証応用万引き検知システム | |
WO2015092375A1 (fr) | Système et procédé de sécurité | |
JP5903557B2 (ja) | セキュリティシステム | |
US7973660B2 (en) | Electronic article surveillance deactivator with multiple label detection and method thereof | |
JP2005128701A (ja) | 電子物品監視システム及びその方法 | |
KR20070101956A (ko) | 적응적 판매관리 시스템과 방법 및 이를 이용한경보시스템과 방법 | |
WO2024196660A1 (fr) | Systèmes et procédés de suivi de prévention de perte | |
WO2025129206A2 (fr) | Réponse par drone lors d'un événement de détection de perte et de récidiviste | |
JP2008252706A (ja) | 人物監視システムおよび人物監視方法 | |
HK1153838B (en) | Electronic article surveillance deactivator with multiple label detection and method thereof |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 14812810 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
32PN | Ep: public notification in the ep bulletin as address of the adressee cannot be established |
Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 08.12.2016) |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 14812810 Country of ref document: EP Kind code of ref document: A1 |