Item security system and method of verifying items selected for purchase at a checkout station

ABSTRACT

An item security system and method of verifying items selected for purchase at a checkout station which focus on reducing losses at the checkout station as opposed to exits. One example method includes reading wireless tags on items at a checkout station by a wireless tag reader, reading barcodes on a number of the items at the checkout station by a barcode reader, comparing the number of items with read barcodes to the items with read wireless tags, and issuing an alert when the number of items is less than all of the items.

BACKGROUND

The present invention relates generally to security at point-of-salelocations and, more specifically, to an item security system and methodof verifying items selected for purchase at a checkout station.

Some stores may attach security labels to items offered for purchase.Current loss prevention systems and methods are directed to identifyingunpurchased items at an exit location using sensors that detect securitylabels that have not been deactivated at a checkout station. Thesesystems include an alarm which sounds when a security label that has notbeen deactivated passes in proximity to the sensors. The alarm isintended to alert security personnel so that they may stop customerscarrying items with security labels that have not been deactivated.

However, checkout personnel often fail to correctly deactivate securitylabels on purchased items, which results in the alarm being sounded whena legitimate customer passes the sensors at the exit location. Checkoutand other store personnel often expect this situation and ignore thealarm when it sounds. Store personnel also find stopping people at thedoor to be awkward, regardless of whether the person carrying the itemsis a legitimate customer or a shoplifter.

Therefore, it would be desirable to provide an alternative securitysystem method by providing an item security system and method at acheckout station.

SUMMARY

In accordance with the teachings of the present invention, a system andmethod of detecting movement of an item is provided.

One example method of verifying items selected for purchase at acheckout station includes reading wireless tags on items at a checkoutstation by a wireless tag reader, reading barcodes on a number of theitems at the checkout station by a barcode reader, comparing the numberof items with read barcodes to the items with read wireless tags, andissuing an alert when the number of items is less than all of the items.

One example method of verifying items tagged with radio frequencyidentification (RFID) tags and selected for purchase at a checkoutstation includes reading the RFID tags on the items at the checkoutstation by a wireless tag reader, adding RFID tag data from the wirelesstags and corresponding item identification data from an item database ina list file, reading barcodes on a number of the items at the checkoutstation by a barcode reader, adding item identification data from readbarcodes to a transaction record of scanned items, comparing itemidentification data in the list file to item identification in thetransaction record of scanned items, and issuing an alert when thetransaction record of scanned items fails to contain one or moreinstances of the item identification data in the list file.

One example item security system at a checkout station includes awireless tag reader at the checkout station, a barcode reader at thecheckout station, and a transaction terminal at the checkout stationconfigured to obtain wireless tag data from wireless tags on itemsselected for purchase at the checkout station from the wireless tagreader, obtain barcode item identification data from less than all ofthe items during scanning of the items at the checkout station from thebarcode reader, identify one or more of the items that were not scanned,and issue an alert to an operator to scan the one or more items.

It is accordingly an object of the present invention to provide an itemsecurity system and method of verifying items selected for purchase at acheckout station.

It is accordingly an object of the present invention to provide an itemsecurity system and method of verifying items selected for purchase at acheckout station which compares scanned items to detected items withwireless identification tags, such as RFID tags.

It is another object of the present invention to provide a system andmethod of detecting attempted thefts at a checkout station, as opposedto at an exit.

It is another object of the present invention to provide a system andmethod of deterring and avoiding thefts by detecting and identifyingunscanned items and alerting the operator to scan the items.

BRIEF DESCRIPTION OF THE DRAWINGS

Additional benefits and advantages of the present invention will becomeapparent to those skilled in the art to which this invention relatesfrom the subsequent description of the preferred embodiments and theappended claims, taken in conjunction with the accompanying drawings, inwhich:

FIG. 1 is a block diagram illustrating an example point of sale (POS)system;

FIG. 2 is a perspective view illustrating an example checkout station;and

FIG. 3 is a flow diagram illustrating an example method of verifyingitems selected for purchase at a checkout station.

DETAILED DESCRIPTION

Referring now to FIG. 1, an example transaction system 10 primarilyincludes point of sale (POS) terminal 12 and various peripherals forcompleting POS transactions. POS terminal 12 and its peripherals may belocated at a checkout station. All types of checkout stations areenvisioned, including those configured for self-service transactions andthose configured for assisted-service transactions. Further, all typesand combinations of transaction establishments are also envisioned,including grocery stores, general merchandise stores, apparel stores,and combinations thereof.

Although embodiments of the present invention may be deployed in variousconfigurations and used in a multi-platform or omni-channel environment.Software disclosed herein may be deployed in different platforms andconfigurations, for example, client server, SaaS, cloud, multi-tenancy,thin client, thick client, service-oriented architecture,micro-services, containerized, virtualized, and omni-channel systems.

In an example embodiment, POS terminal 12 includes one or moreprocessors, memory, and program and data storage. POS terminal 12 mayexecute an operating system, such as a Microsoft, Google, Apple, orLinux operating system. POS terminal 12 further includes networkcircuitry for connecting to a network, via wire and/or wireless, andother circuitry for connecting to the various peripherals. For example,POS terminal 12 may include Universal Serial Bus (USB) circuitry and/orBluetooth standard circuitry.

In the example embodiment, peripherals used by POS terminal 12 tocomplete transactions may include barcode reader 24, scale 26, one ormore payment peripherals 28, printer 30, input device 32, and display34.

In the example embodiment, POS terminal 12 executes transaction software36, which displays transaction screens on display 34 and receivesoperator selections via input device 32 in order to complete atransaction with a customer. Specifically, transaction software usesitem identification data to obtain prices from item database 42 andcompletes payment for selected items.

In the example embodiment, barcode reader 24 is the primary peripheralfor identifying items selected for purchase. An operator mayalternatively use input device 32, for example, when manually keying inidentification information for produce and items with defectivebarcodes.

Barcode reader 24 reads barcodes on items to obtain item identificationdata, and sends the item identification data to transaction software 36,which then adds the items to the current transaction as part of atransaction record.

An example barcode reader 24 may include one or more cameras forcapturing images of products, and software for locating and decodingbarcodes in images.

Another example barcode reader 24 may include one or more lasers,mirrors for scanning a barcode on an item using laser light, andsoftware for decoding the barcodes in signals from photodetectors.

Another example barcode reader 24 may include a combination of cameraand laser-based scanning components.

In the example embodiment, scale 26 is used to items which are sold byweight, such as produce items.

An example scale 26 is integrated into barcode reader 24 and includesone or more load cells and a weigh plate. The weigh plate includes awindow to allow barcode reading elements to scan barcodes on items abovethe weight plate.

In the example embodiment, payment peripherals 28 may include one ormore of a payment card reader, personal identification number (PIN)keypad for debit card purchases, signature capture pad, cash moneydrawer, a coin acceptor, a coin dispenser, currency acceptor, currencydispenser, a coin recycler, and a currency recycler.

An example payment peripheral 28 includes a payment terminal thatcombines the card reader, PIN keypad, and signature capture pad in asingle housing.

Various configurations of payment peripherals are envisioned. Further,configurations may be based upon the use for POS terminal 12. Forexample, an assisted-service checkout station may include a cash moneydrawer, whereas a self-service checkout station may include currency andcoin recyclers.

An example printer 30 includes a printer for printing receipts, coupons,and other information.

An example Input device 32 may include a keyboard or touch overlay todisplay 34.

In the example embodiment, POS terminal 12 implements a security checkexplained in more detail below which determines items that have not beenscanned by barcode reader 24. The security function may involve trackingitems that have been scanned by barcode reader 24 and items that havenot been scanned by barcode reader 24.

In one example embodiment, transaction software 36 may be configured forthis purpose. In another example embodiment, POS terminal 12 may executeseparate security software for this purpose.

In one example embodiment, transaction system 10 includes one or morewireless tag readers 22 for reading wireless labels or tags 52, whichmay include radio frequency identification (RFID) tag readers and RFIDtags on items 50.

When a wireless tag 52 is present on item 50, along with barcode 54,wireless tag reader 22 reads data from wireless tag 52. The wireless tagdata may include item identification data or may include informationcross-referenced to the barcode item identification data in itemdatabase 42. For example, each wireless tag 52 may contain a unique tagnumber that may be cross-referenced to barcode data in item database 42.For like items, item database 42 may contain a plurality of differentwireless tag data associated with each barcode data.

In one example embodiment, wireless tag reader 22 may be used inconnection with barcode reader 24 for redundancy, or in lieu of barcodereader 24, to identify items 50 and enter them into a transaction.Barcode reader 24 may typically be used as the primary peripheral forscanning items into a transaction, but roles may be reversed, withwireless tag reader 24 being the primary peripheral for scanning itemsinto a transaction and barcode reader 24 being used instead to scanitems for the security check.

In one example embodiment, transaction software 36 may be configured toissue an alert when RFID data is received from wireless tag 52 on anitem 50, but corresponding barcode data has not been received frombarcode reader 24.

In one example embodiment, transaction software 36 may be configured toissue an alert when RFID data is received from wireless tags 52 on allitems 50 with wireless tags, but corresponding barcode data has beenreceived from a number of items less than all of the items.

In the example embodiment, all items or fewer than all items may betagged with wireless tags 52. For example, an establishment may chooseto only apply wireless tags 52 to high-value items, items which wouldresult in the establishment suffering significant losses if they werestolen.

In the example embodiment, any type of wireless tag 52 may be employed,such as active or passive RFID tag in any of the Low Frequency (LF),High Frequency (HF), or Ultra High Frequency (UHF) bands. Passive UHFRFID tags offer a low-cost alternative for retail inventory tracking andhave a range that is suited for a checkout environment.

In the example embodiment, one or more wireless tag readers 52 and theirconnected antennas may be located on or in the vicinity of a checkoutstation.

In the example embodiment, a single wireless tag reader 22 may beconnected to multiple antennas that are positioned at various locationson the checkout station. For example, wireless tag reader 22 may beconnected a multiplexor which supports multiple antennas.

In the example embodiment, wireless tag 52 reading range may beoptimized and limited to within a reading boundary associated with aparticular checkout station to ensure that wireless tags 52 within thereading boundary are read and that wireless tags 52 of other nearbyitems selected by other customers at the same or other checkout stationsare not read. For example, the reading boundary may be established byadjustment of wireless tag reader 22 transmit power, selection ofsuitable antennas based upon their gain and size, and optimization ofantenna directivity and placement.

In one example embodiment, the reading boundary may extend verticallyfrom the floor to the highest point of the checkout station.

In one example embodiment, the reading boundary may extend from thebarcode reader to a bagging well, including coverage for the operatorarea. For this purpose, various antennas may be positioned at variouslocations on the checkout station.

In one example embodiment, POS terminal 12 identifies items 50 withwireless tags 52 that have not been scanned by barcode reader 24.

In one example embodiment, transaction software 36 may be configured todetermine whether wireless tag data corresponds to barcode data obtainedfrom barcode reader 24. This serves to determine whether a theft or itemsubstitution attempt has occurred.

When no corresponding barcode data from barcode reader 24 was made ofrecord in a transaction (indicating that item 50 was not scanned by theoperator), transaction software 36 issues an alert. For example,transaction software 36 may be configured to display an alert to theoperator, instructing the operator to scan item 50. In anassisted-service transaction, transaction software 36 may be configuredto send an alert to a supervisor or head cashier. In a self-servicetransaction, transaction software 36 may be configured to send an alertto an attendant. Under some circumstances, transaction software 36 maybe configured to issue an alert to security personnel.

As another example, transaction software 36 may be configured to givethe operator a specific time period to scan item 50. If thecorresponding barcode data is not received following expiration of thetime period, transaction software 36 may be configured to send an alert.

In one example embodiment, transaction software 36 may be configured toissue the alert after an operator selection that finalizes the totalamount of a transaction, such as pressing a “total” or equivalent buttonor key.

In one example embodiment, transaction software 36 may be configured toissue the alert after an operator selection related to a payment phaseof a transaction, such as pressing a “finish and pay” or equivalentbutton or key, or a choice of credit card button or key.

In one example embodiment, transaction software 36 may be configured tocreate a list file 38 containing wireless tag data from wireless tags 52that have been read.

In one example embodiment, transaction software 36 may be configured toalso add corresponding barcode data from item database 42 to list file38 for later comparison to scanned barcode data. Alternatively,transaction software 36 may read corresponding barcode data from itemdatabase 42 to compare with scanned barcode data when the security checkis completed.

In one example embodiment, transaction software 36 may be configured toalso add barcode data associated with scanned items to list file 38.Alternatively, transaction software 36 may read scanned barcode datafrom the transaction record when a security check is completed.

Wireless tags 52 may be expected to be read before corresponding itemsare scanned. However, transaction software 36 may be configured to checklist file 38 and the transaction record for scanned barcode data toaccount for items that are scanned before their wireless tag data isreceived.

Wireless tags 52 may be read multiple times while items are at acheckout station. In one example embodiment, transaction software 36 maybe configured to compare wireless tag data already in list file 38 tonewly read wireless tag data and only add new wireless tag data that isnot already in list file 38.

In one example embodiment, transaction software 36 may be configured toidentify a plurality of like items 50 with wireless tags 52 and enterwireless tag data and corresponding identification data in list file 38.

In one example embodiment, transaction software 36 may be configured toadd any unscanned pluralities of like items to list file 38 and removethem incrementally each time one of the like items is scanned. Forexample, when six like items having different wireless tag data are readby wireless tag reader 22, six different entries having the same itemidentification data are included within list file 38. When transactionsoftware 36 receives the barcode data only five times as part of fivescanning events, transaction software 36 removes only five of the itementries from list file 38. The five item entries may be arbitrary, sincetransaction software 36 is tracking scanning events.

In one example embodiment, transaction software 36 may be configured toadd entries to list file 38 from the time it receives an indication tobegin a transaction.

In one example embodiment, transaction software 36 may be configured toadd entries to list file 38 when a first barcode 54 is read on a firstitem 50.

In one example embodiment, transaction software 36 may be configured tocompare scanned items to items in list file 38 and remove scanned itemsfrom list file 38 after the last item 50 is scanned by barcode reader24.

In one example embodiment, transaction software 36 may be configured tostop adding entries to list file 38 after an operator selection thatfinalizes the total amount of a transaction, such as pressing a “total”or equivalent button or key step.

In one example embodiment, transaction software 36 may be configured tostop adding entries to list file 38 after an operator selection of astep in a payment phase of a transaction, such as pressing a “finish andpay” or equivalent button or key or a choice of credit card button orkey.

In one example embodiment, wireless tag reader 22 may still beinterrogating wireless tags 52 and transaction software 36 may still belooking for unscanned items, while items are being bagged at anassisted-service checkout station.

In one example embodiment, transaction software 36 may be configured tocompare scanned items to items in list file 38 and remove scanned itemsfrom list file 38 continuously as items 50 are scanned by barcode reader24.

In one example embodiment, transaction software 36 may be configured tocompare scanned items to items in list file 38 and remove scanned itemsfrom list file 38 after the “total” or equivalent button or key isselected by an operator.

In one example embodiment, transaction software 36 may be configured tocompare scanned items to items in list file 38 and remove scanned itemsfrom list file 38 after an operator selection of a step in a paymentphase of a transaction, such as pressing a “finish and pay” orequivalent button or key or a choice of credit card button or key.

Turning now to FIG. 2, an example checkout station 60 is illustrated,which includes a self-service checkout station operated by customers.Checkout station 60 may be one of a plurality of self-service checkoutstations in a checkout area. In one example, two rows of two checkoutstations 60 are located parallel to each other, with an attendantstation overseeing operation at each of the checkout stations 60.

The example checkout station 60 includes an item shelf 62 on one side.Customers may place items or a small shopping basket on item shelf 62. Amain portion 64 contains a barcode reader with a scale 26 in ahorizontal portion flush with the checkout surface, a self-containedterminal with touch screen 66 mounted above a vertical or “tower”portion of barcode reader 64, a variety of payment peripherals 28, and alane light assembly 68. On an opposite side, checkout station 60includes a bag well portion 70 with a bag rack 72 and security scale 74.

The example checkout station 60 further includes an RFID tag reader andone or more antennas placed on checkout station 60 so as to create athree-dimensional reading boundary 80 around checkout station 60 (whereonly a footprint of the reading boundary 80 on the floor is illustratedfor clarity). The RFID tag reading range may be optimized and limited towithin reading boundary 80 to ensure that RFID tags within readingboundary 80 are read and to ensure that RFID tags of other nearby itemsselected by other customers nearby or at other checkout stations 60 arenot read.

In one example embodiment, RFID tag reader may be integrated intobarcode reader 24.

In one example embodiment, a single RFID tag reader may be connected tomultiple antennas that are positioned at various locations on thecheckout station. For example, an RFID tag reader may be connected to amultiplexor which supports multiple antennas.

In the illustrated example, five antennas 82 are placed around checkoutstation 60 to read RFID tags on items as they are moved from one ofcheckout station to the other. A first antenna 82 a is located on a sideof the main portion 64 facing the item shelf 62. A second antenna 82 bis located within the tower portion of barcode reader 64 facing thecustomer. A third antenna 82 c is located low on the main portion facingthe customer and items that may be located on a lower shelf of ashopping cart. A fourth antenna 82 d is located in bag well portion 70facing the customer and/or the customers bags. A fifth antenna 82 e islocated on lane light assembly 68 facing downwards. Antenna coverageassociated with any one antenna 82 may overlap one or more detectionareas of other antennas 82.

The reading boundary 80 may be established by one or more of RFID tagreader transmit power adjustment, antenna gain selection, andoptimization of antenna directivity. In this example, reading boundary80 extends from about the left edge of item shelf 62 to about the rightedge of bag well portion 70, and vertically to antenna 82 e. Asufficient amount of space in the customer aisle where the customermoves may be covered, but the reading boundary 80 may end substantiallyat the opposite edge of the checkout station 80 so as to avoid theadjacent customer aisle.

Other numbers and shapes of reading boundaries 80 are also envisioned.For example, a plurality of reading boundaries 80 may be established.The reading boundaries 80 may be associated with specific areas ofcheckout station 60, such as shelf 62, main portion 64, and bag wellportion 70.

In an alternative embodiment, reading boundary 80 may be more focused onone portion of checkout station 60 than another. For example, readingboundary 80 may be more focused on shelf 62 and the adjacent aisle andconfigured to optimally read most, if not all, wireless tags when thecustomer initiates a new transaction. In one example, coverage in thisarea may be enhanced by adding additional antennas and/or making otherconfiguration changes.

In another alternative embodiment, reading boundary 80 may be morefocused on the main portion 64 and the adjacent aisle with correspondingreader hardware and configuration changes.

In another alternative embodiment, reading boundary 80 may be morefocused on the bag well portion 70 and the adjacent aisle withcorresponding reader hardware and configuration changes.

In operation, a customer places items on shelf 62 and selects an optionto begin a transaction. RFID tag reader optimally reads all RFID tags onthe items using antenna 82 a. RFID tag reader may also read RFID tags onitems that have not been placed on shelf 62, depending on the readingrange of antenna 82 a. Transaction software 36 creates or updates listfile 38 to include RFID tag data and corresponding barcode data.Transaction software 36 compares the contents of list file 38 to newlyidentified items and adds corresponding item identification dataassociated with the new items from item database 42.

The customer then scans the items using barcode reader 64. Optimally,RFID tag reader reads RFID tags on all scanned items using antenna 82 b.RFID tag reader also reads RFID tags on all items below the checkoutsurface, such as items transferred below the checkout surface by thecustomer in a false scanning motion, and items remaining on the lowershelf of a shopping cart, using antenna 82 c. Since any of the RFID tagsmay be read multiple times, transaction software 36 compares thecontents of list file 38 to newly identified items and addscorresponding item identification data associated with the new itemsfrom item database 42.

The customer then puts the items in bags. Optimally, RFID tag readerreads RFID tags on bagged items using antenna 82 d. Transaction software36 compares the contents of list file 38 to newly identified items andadds corresponding item identification data associated with the itemsfrom item database 42.

At any of customer steps above, RFID tag reader may read RFID tags onitems using antenna 82 e. Since input from this or other antennas 82 mayoccur at various times during the transaction, transaction software 36continuously evaluates newly identified items against the contents oflist file 38 and the transaction record.

Transaction software 36 processes like items in a similar fashion. TheRFID tag reader optimally reads all RFID tags on the like items usingany or all of the antennas 82. Transaction software 36 creates orupdates list file 38 to include RFID tag data of all the like items andcorresponding barcode data. Since any of the RFID tags may be readmultiple times, transaction software 36 also compares the contents oflist file 38 to newly identified items and adds corresponding itemidentification data associated with the new items from item database 42.

In this example, transaction software 36 stops processing RFID taginformation when the customer selects an option to finalize thetransaction, such an option to pay, since, presumably, the self-servicecustomer has finished scanning items at that point. Transaction software36 makes a final comparison of the item identification data in list file38 to the identification data in the transaction record to determinewhether any items with RFID tags were not scanned.

For single items, the comparison is a one-time comparison of barcodeidentification data in list file 38 with barcode identification data inthe transaction record.

For a plurality of like items, the comparison occurs incrementally foreach instance of the common barcode identification data in thetransaction record. When one or more instances remain in list file 38after the comparison, a possible theft situation exists involving theone or more remaining like items in list file 38.

When transaction software 36 identifies one or more items in list file38 with no corresponding data from barcode reader 64, indicating thatthe items were not scanned, transaction software 36 issues an alert tothe operator to scan the items. After the customer scans the items,transaction software 36 deletes or clears the corresponding itemidentification data from list file 38 and proceeds with the paymentphase.

Modifications of this method are also envisioned. For example,transaction software 36 may be configured to send a separate alert tothe attendant when one or more items are added to list file 38. Theattendant may then focus on the customer and provide assistance asnecessary. The attendant may additionally notify security if theattendant observes any overt attempts by the customer to avoid scanningitems.

Turning now to FIG. 3, an example method of verifying items at acheckout station is illustrated, beginning with step 100.

In step 100, transaction software 36 receives an operator selection tobegin a transaction at a checkout station 60.

In step 102, transaction software 36 activates the RFID tag reader tobegin reading RFID tags within reading boundary 80 of checkout station60.

In step 104, transaction software 36 adds identification informationassociated with any detected RFID tags to list file 38. For example,transaction software 36 may be configured to add RFID data andcorresponding item identification data from item database 42.

Transaction software 36 may be configured to compare the RFID data topreviously entered RFID data and only add different RFID data andcorresponding identification data. Transaction software 36 may also beconfigured to check the transaction record when RFID data is received todetermine whether the item was scanned before the RFID tag was read, andif so enter the item identification data associated with the RFID tagdata.

Alternatively, transaction software 36 may be configured to wait untilafter scanning has finished to populate list file 38 with itemidentification data from item database 42 associated with the RFID data,and then compare the contents of list file 38 with scanned itemidentification data from the transaction record.

In step 106, transaction software 36 receives an operator selection tofinalize the transaction. For example, transaction software 36 mayreceive a selection to total the purchases. As another example,transaction software 36 may receive a selection to process payment.

In step 108, transaction software 36 identifies one or more items inlist file 38 with no corresponding data from barcode reader 64,indicating that the items were not scanned.

In step 110, transaction software 36 issues an alert to the operator toscan the identified items. Transaction software 36 may also beconfigured to issue an alert to any of an attendant, a supervisor, or asecurity person.

In step 112, transaction software 36 receives item identification datafor the identified items.

In step 114, transaction software 36 processes payment and closes thetransaction.

The example methods may be used in connection with both self-service andassisted service checkout stations. The reading boundary may be adjustedto cover risk areas associated with each type of checkout station.

Advantageously, the systems and methods disclosed herein would greatlyreduce or deter item shrinkage due to theft, including shoplifting andsweethearting. The systems and methods would also reduce the number ofcustomer encounters with security personnel at exit locations.

The systems and methods disclosed herein are also useful in combattingitem replacement fraud, where one item is scanned and another, moreexpensive item, is taken. Such attempts at not scanning the moreexpensive item would be detected following reading of the wireless tagon the more expensive item.

The systems and methods disclosed herein may be used in conjunction withconventional exit-based security systems, including security sensors atexits and product security labels that are read by such sensors whenthey are not deactivated at checkout stations.

Although the present invention has been described with particularreference to certain preferred embodiments thereof, variations andmodifications of the present invention can be effected within the spiritand scope of the following claims. The present invention also hasapplicability in tracking other types of items besides retail productsand office equipment.

1-20. (canceled)
 21. A method of verifying items selected for purchaseat a checkout station comprising: receiving wireless tag data fromwireless tags on the items at the checkout station using a wireless tagreader; adding the wireless tag data from the wireless tags to a list;receiving barcode data from barcodes on a number of the items at thecheckout station using a barcode reader; adding the barcode data fromthe barcodes to a transaction record; comparing the wireless tag datafrom the list to the barcode data in the transaction record; and issuingan alert when the transaction record fails to include barcode data ofone of the items when the wireless tag data of the one item is in thelist.
 22. The method of claim 1, wherein issuing an alert comprisesdisplaying an indication to scan the one item, and issuing the alertafter a predetermined time period when the barcode data of the one itemis not received.
 23. The method of claim 1, wherein issuing an alertcomprises issuing the alert after a selection finalizing a total amountof the number of items is received.
 24. The method of claim 1, whereinissuing an alert comprises issuing the alert after a selection toprovide payment is received.
 25. The method of claim 1, wherein addingwireless tag data comprises comparing read wireless tag data to wirelesstag data in the list and only adding the read wireless tag data to thelist when the read wireless tag data is not already in the list.
 26. Themethod of claim 1, wherein comparing comprises removing one of the itemsfrom the list after the one item is scanned.
 27. The method of claim 1,wherein adding wireless tag data comprises adding wireless tag data foreach of a plurality of like items to the list.
 28. The method of claim7, wherein comparing comprises removing one of the like items from thelist for each one of the like items that is scanned.
 29. An itemsecurity system at a checkout station comprising: a display at thecheckout station; a wireless tag reader at the checkout station,including a plurality of antennas placed on the checkout station,wherein the plurality of antennas creates a reading boundary around thecheckout station; a barcode reader at the checkout station; and atransaction terminal at the checkout station configured to: receivewireless tag data from wireless tags on the items at the checkoutstation from a wireless tag reader; add the wireless tag data from thewireless tags to a list; receive barcode data from barcodes on a numberof the items at the checkout station from a barcode reader; add thebarcode data from the barcodes to a transaction record; compare thewireless tag data from the list to the barcode data in the transactionrecord; and issue an alert when the transaction record fails to includebarcode data of one of the items when the wireless tag data of the oneitem is in the list.