Systems and methods for increasing alarm confidence in EAS detection systems

ABSTRACT

Systems and methods for operating an EAS detection system. The methods comprise: detecting an Active Security Tag (“AST”) in an EAS detection zone; determining whether AST is coupled to an object identified in a list; and performing operations when a determination is made that AST is coupled to a listed object. The operations involve: accessing sensor data generated by at least one sensor device disposed on/near display equipment associated with the listed object; processing the sensor data to determine whether a person was within a defined distance range of AST during a period of time immediately preceding the detecting; concluding that a false alarm scenario exists when the sensor data indicates that a person was not within the defined distance range of AST during the period of time; and suppressing alarm issuance by the EAS detection system in response to the false alarm scenario conclusion.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application claims priority to U.S. Non-Provisional applicationSer. No. 16/259,847, titled “Systems and Methods for Increasing AlarmConfidence in EAS Detection Systems,” filed on Jan. 28, 2019, the entirecontents of which are hereby incorporated by reference herein.

BACKGROUND Statement of the Technical Field

The present solution relates generally to Electronic ArticleSurveillance (“EAS”) detection systems. More particularly, the presentsolution relates to systems and methods for increasing alarm confidencein EAS detection systems.

Description of the Related Art

EAS detection systems generally comprise a tag reader for transmittinginterrogation signals into an EAS detection zone (or interrogation zone)and for receiving response signals transmitted from RFID tags inresponse to the interrogation signals. The EAS detection system issuesan alarm when a response signal is received from one or more RFID tags.The alarm indicates the presence of an RFID tag in the interrogationzone. The alarm can then be the basis for initiating one or moreappropriate responses depending upon the nature of the facility.Typically, the interrogation zone is in the vicinity of an exit from afacility such as a retail store, and the RFID tags can be attached toarticles such as items of merchandise or inventory.

In some cases, display equipment is placed within the read area of thetag reader. Articles with active RFID tags coupled thereto are disposedon the display equipment. These active RFID tags are read by the tagreader even though they are not in the interrogation zone and/or leavingthe facility. As such, false alarms are issued by the EAS detectionsystem.

One conventional solution for solving the false alarming issue of EASdetection systems involves using a list of all articles located nearexits of the facility. The EAS detections systems will not issue analarm when RFID tags coupled to the listed articles are read thereby.However, this solution has two problems. First, these articles can beeasily stolen since a person can carry the same through theinterrogation zone without any alarm issuance by the EAS detectionsystem. Second, when customers shop and move non-listed articles intoproximity of the EAS detection system, false alarms are issued by theEAS detection system.

Another solution for solving the false alarming issue of EAS detectionsystems involves placing articles further away from the tag readers. Thedownside to this solution is that retailers loose valuable space at themost visible part of the retail stores (i.e., the entrances).

SUMMARY

The present disclosure generally concerns systems and methods foroperating an EAS detection system. The methods comprise: detecting anactive security tag in an EAS detection zone; determining whether theactive security tag is coupled to an object identified in a list; andperforming operations when a determination is made that the activesecurity tag is coupled to an object identified in the list. Theoperations include: accessing sensor data generated by at least onesensor device (e.g., a motion sensor and/or camera) disposed on or neardisplay equipment associated with the object identified in the list;processing the sensor data to determine whether a person was within adefined distance range of the active security tag during a period oftime immediately preceding the detecting; concluding that a false alarmscenario exists when the sensor data indicates that a person was notwithin the defined distance range of the active security tag during theperiod of time; and suppressing alarm issuance by the EAS detectionsystem in response to the false alarm scenario conclusion.

In some scenarios, the list is generated during off hours. For example,the EAS detection system performs operations to read security tagsduring the off hours and generate/update the list such that it includesidentifiers for objects to which the read security tags are coupled. Analarm is issued by the EAS detection system when a determination is madethat the active security tag is not coupled to an object identified inthe list.

When a determination is made that a person was within the defineddistance range of the active security tag during the period of time, thesensor data is used to classify the person as a customer or employee. Aconclusion is made that a false alarm scenario exists when the person isclassified as an employee. In contrast, a conclusion may be made that areal alarm scenario exists when the person is classified as a customer.However, a conclusion is made that a false alarm scenario exists when(a) the person is classified as a customer and (b) image analysisindicates that the customer is not an individual present in the EASdetection zone at the time of the detecting, that no individual waspresent in the EAS detection zone at the time of the detecting, and/orthat the object to which the active security tag is coupled is not thesame as the object present in the EAS detection zone at the time of thedetecting.

In those or other scenarios, the sensor data is used to determine if aninanimate object was within a defined distance range of the activesecurity tag during a period of time immediately preceding thedetecting. A conclusion is made that a false alarm scenario exists whena determination is made that an inanimate object other than anorder-fulfilling robot was within the defined distance range of theactive security tag during the period of time.

BRIEF DESCRIPTION OF THE DRAWINGS

The present solution will be described with reference to the followingdrawing figures, in which like numerals represent like items throughoutthe figures.

FIG. 1 is an illustration of an illustrative system.

FIG. 2 is a side view of an illustrative monitoring system including inan EAS detection system.

FIG. 3 is a top view of the illustrative monitoring system shown in FIG.2, which is useful for understanding an EAS detection zone thereof.

FIGS. 4 and 5 are drawings which are useful for understanding fields ofantennas which are used in the monitoring system of FIGS. 2-3.

FIG. 6 is an illustration showing the antenna fields of the monitoringsystem of FIGS. 2-3 overlapping each other.

FIG. 7 is a block diagram of the system controller shown in FIGS. 2-3.

FIG. 8 is an illustration showing display equipment located in the tagread range of the monitoring system.

FIG. 9 is an illustration showing an illustrative layout for variouscomponents of the system shown in FIG. 1.

FIG. 10 shown an illustrative white list table.

FIGS. 11A-11C (collectively referred to as “FIG. 11”) is a flowchart ofan illustrative method for operating an EAS detection system.

DETAILED DESCRIPTION

It will be readily understood that the components of the embodiments asgenerally described herein and illustrated in the appended figures couldbe arranged and designed in a wide variety of different configurations.Thus, the following more detailed description of various embodiments, asrepresented in the figures, is not intended to limit the scope of thepresent disclosure, but is merely representative of various embodiments.While the various aspects of the embodiments are presented in drawings,the drawings are not necessarily drawn to scale unless specificallyindicated.

The present solution may be embodied in other specific forms withoutdeparting from its spirit or essential characteristics. The describedembodiments are to be considered in all respects only as illustrativeand not restrictive. The scope of the present solution is, therefore,indicated by the appended claims rather than by this detaileddescription. All changes which come within the meaning and range ofequivalency of the claims are to be embraced within their scope.

Reference throughout this specification to features, advantages, orsimilar language does not imply that all of the features and advantagesthat may be realized with the present solution should be or are in anysingle embodiment of the present solution. Rather, language referring tothe features and advantages is understood to mean that a specificfeature, advantage, or characteristic described in connection with anembodiment is included in at least one embodiment of the presentsolution. Thus, discussions of the features and advantages, and similarlanguage, throughout the specification may, but do not necessarily,refer to the same embodiment.

Furthermore, the described features, advantages and characteristics ofthe present solution may be combined in any suitable manner in one ormore embodiments. One skilled in the relevant art will recognize, inlight of the description herein, that the present solution can bepracticed without one or more of the specific features or advantages ofa particular embodiment. In other instances, additional features andadvantages may be recognized in certain embodiments that may not bepresent in all embodiments of the present solution.

Reference throughout this specification to “one embodiment”, “anembodiment”, or similar language means that a particular feature,structure, or characteristic described in connection with the indicatedembodiment is included in at least one embodiment of the presentsolution. Thus, the phrases “in one embodiment”, “in an embodiment”, andsimilar language throughout this specification may, but do notnecessarily, all refer to the same embodiment.

As used in this document, the singular form “a”, “an”, and “the” includeplural references unless the context clearly dictates otherwise. Unlessdefined otherwise, all technical and scientific terms used herein havethe same meanings as commonly understood by one of ordinary skill in theart. As used in this document, the term “comprising” means “including,but not limited to”.

The present solution provides EAS detection systems with an improvedfalse alarm performance. The improvement in false alarming of the EASdetection systems is at least facilitated by the implementation of anovel method for increasing alarm confidence. The method involves:detecting an active security tag in an EAS detection zone; determiningwhether the active security tag is coupled to an object identified in alist; and performing operations when a determination is made that theactive security tag is coupled to an object identified in the list. Theoperations include: accessing sensor data generated by at least onesensor device (e.g., a motion sensor and/or camera) disposed on or neardisplay equipment associated with the object identified in the list;processing the sensor data to determine whether a person was within adefined distance range of the active security tag during a period oftime immediately preceding the detecting; concluding that a false alarmscenario exists when the sensor data indicates that a person was notwithin the defined distance range of the active security tag during theperiod of time; and suppressing alarm issuance by the EAS detectionsystem in response to the false alarm scenario conclusion.

In some scenarios, the list is generated during off hours. For example,the EAS detection system performs operations to read security tagsduring the off hours and generate/update the list such that it includesidentifiers for objects to which the read security tags are coupled. Analarm is issued by the EAS detection system when a determination is madethat the active security tag is not coupled to an object identified inthe list.

When a determination is made that a person was within the defineddistance range of the active security tag during the period of time, thesensor data is used to classify the person as a customer or employee. Aconclusion is made that a false alarm scenario exists when the person isclassified as an employee. In contrast, a conclusion may be made that areal alarm scenario exists when the person is classified as a customer.However, a conclusion is made that a false alarm scenario exists when(a) the person is classified as a customer and (b) image analysisindicates that the customer is not an individual present in the EASdetection zone at the time of the detecting, that no individual waspresent in the EAS detection zone at the time of the detecting, and/orthat the object to which the active security tag is coupled is not thesame as the object present in the EAS detection zone at the time of thedetecting.

In those or other scenarios, the sensor data is used to determine if aninanimate object was within a defined distance range of the activesecurity tag during a period of time immediately preceding thedetecting. A conclusion is made that a false alarm scenario exists whena determination is made that an inanimate object other than anorder-fulfilling robot was within the defined distance range of theactive security tag during the period of time.

Illustrative System Architecture

Referring now to FIG. 1, there is shown an illustrative system 100.System 100 comprises a Retail Store Facility (“RSF”) 150 and a corporatefacility 152. At the RSF 150, objects 102 are offered for sale. Theobjects 102 can include any type of merchandise or inventory (e.g.,clothing, produce, toys, electronics, etc.). The objects 102 aredisplayed on display equipment 108 (e.g., shelves, cabinets, tables, arack, etc.) such that they are accessible to customers.

An EAS detection system 114 is provided to detect and mitigate theft ofthe objects 102 from the RSF 150. The EAS detection system 114 isdescribed herein in terms of an RFID based EAS detection system. Othertypes of EAS detection systems, including systems that use AM type tagsand AM EAS detection systems, can additionally be employed herein. TheEAS detection system 114 comprises one or more monitoring systems 116.The monitoring system(s) 116 will be described in detail below. Still,it should be understood that the monitoring system(s) 116 is(are)configured to detect active security tags 104 within EAS detectionzone(s) (e.g., near exits of RSF 150) and issue alarms when suchdetections are made.

Notably, system 100 is configured to identify when these alarms arefalse alarms. Alarm issuance is suppressed when a false alarm has beenidentified. Various technologies are used to identify false alarms. Suchtechnologies include, but are not limited to, camera(s) 106, tagreader(s) 110, and/or sensor(s) 112. Cameras and tag readers are wellknown in the art, and therefore will not be described herein. Any knowncamera and/or tag reader can be used herein without limitation. Forexample, camera(s) 106 can include, but is(are) not limited to, amonocular camera, a stereo camera, a depth camera, and/or an Infrared(“IR”) camera. The sensor(s) 112 can include, but are not limited to,motion sensor(s) (e.g., vibration sensors and/or Passive Infrared(“PIR”) sensors). These devices 106, 110, 112 are placed on or adjacentto the display equipment 108 such that images/videos of activity in thevicinity of the display equipment can be captured, security tagsdisposed on the display equipment can be read, and/or motion of thedisplay equipment can be detected. Time stamps are stored along withimage/video data, tag read data and/or motion sensor data in a datastore 120, 128. This information is used to identify false alarms by theEAS detection system 114, server 118 and/or computing device 124.

For example, when the monitoring system 116 detects an active securitytag in the EAS detection zone, data generated by devices 106, 110 and/or112 is analyzed to determine if a person was in proximity (e.g., within1-2 feet) of the active security tag during a period of time (e.g., Nminutes or hours) immediately preceding the active security tag'sdetection by the monitoring system 116. If not, then the alarm isconsidered a false alarm and issuance thereof is suppressed. In contrastif a person was in proximity of the security tag during the prescribedperiod of time, image analysis is performed to classify the person as acustomer or employee. The person is classified as an employee when (s)heis wearing a uniform, otherwise the person is classified as a customer.The alarm is considered a false alarm when the person is classified asan employee and is considered a real alarm when the person is classifiedas a customer. Other ways the data generated by devices 106, 110, 112 isused to identify false alarms will become evident as the discussionprogresses.

Components 106, 110, 112, 114, 118, 120, 124, 128 of system 100communicate with each other via a public network 122 (e.g., theInternet) and/or a private network 126 (e.g., an Intranet). Servers,computing devices, public networks and private networks are well knownin the art, and therefore will not be described in detail herein. Anyknown or to be known server, computing device, public network and/orprivate network can be used herein without limitation.

Referring now to FIGS. 2 and 3, an illustrative architecture for themonitoring system 116 of the EAS detection system 114 is provided. Themonitoring system 116 is positioned at a location adjacent to anentry/exit 204 of the RSF 150. The monitoring system 116 uses speciallydesigned EAS marker tags (“security tags”) 104 which are applied tostore merchandise or other items 102 which are stored within the RSF150. The security tags can be deactivated or removed by authorizedpersonnel at the RSF 150. For example, in a retail environment, thesecurity tags could be removed by store employees when a successfulpurchase has been performed.

When an active security tag 104 is detected by the monitoring system 116in an idealized representation of an EAS detection zone (orinterrogation zone) 350 near the entry/exit, the monitoring system 116detects the presence of such security tag and issues an alarm.Accordingly, the monitoring system 116 is arranged for detecting andpreventing the unauthorized removal of articles or products fromcontrolled areas.

The monitoring system 116 includes a pair of pedestals 202 a, 202 b,which are located a known distance apart (e.g., at opposing sides of anentry/exit 204). The pedestals 202 a, 202 b are typically stabilized andsupported by a base 206 a, 206 b. The pedestals 202 a, 202 b will eachgenerally include one or more antennas that are suitable for aiding inthe detection of the special EAS security tags, as described herein. Forexample, pedestal 202 a can include at least one antenna 220 a suitablefor transmitting or producing an RF exciter signal (or interrogationsignal) and receiving response signals generated by active security tagsin the EAS detection zone 350. In some scenarios, the same antenna canbe used for both receive and transmit functions. Similarly, pedestal 202b can include at least one antenna 220 b suitable for transmitting orproducing an RF exciter signal (or interrogation signal) and receivingresponse signals generated by security tags in the EAS detection zone350.

In some scenarios, a single antenna can be used in each pedestal. Thesingle antenna is selectively coupled to the EAS receiver. The EAStransmitter is operated in a time multiplexed manner. However, it can beadvantageous to include two antennas in each pedestal as shown in FIG.2, with an upper antenna positioned above a lower antenna.

The antennas located in the pedestals 202 a, 202 b are electricallycoupled to a system controller 210. The system controller 210 controlsthe operation of the monitoring system 116 to perform EAS functions asdescribed herein. The system controller 210 can be located within a base206 a, 206 b of one of the pedestals 202 a, 202 b or can be locatedwithin a separate chassis at a location nearby to the pedestals. Forexample, the system controller 210 can be located in a ceiling justabove or adjacent to the pedestals 202 a, 202 b.

As noted above, the EAS detection system comprises an RFID type EASdetection system. As such, each antenna is used to generate an RFIDsignal which serves as an interrogation signal. The interrogation signalcauses the security tag 104 to generate and transmit an RFID responsesignal. The RFID response signal includes a unique identifier of thesecurity tag 104 and/or object to which it is coupled. The RFID responsesignal is used to indicate a presence of the security tag within the EASdetection zone (or interrogation zone) 350. As noted above, the sameantenna contained in a pedestal 202 a, 202 b can serve as both thetransmit antenna and the receive antenna.

A camera 108 a, 108 b may be coupled to one or more of the pedestals 202a, 202 b. Additionally or alternatively, a camera can be located in theceiling just above the pedestals 202 a, 202 b and/or mounted on a walladjacent to the pedestals 202 a, 202 b. The camera(s) 108 a, 108 bis(are) arranged such that their Field Of View (“FOV”) cover(s) the EASdetection zone 350. The camera(s) 108 a, 108 b is(are) provided tocapture images/videos of the EAS detection zone when an active securitytag 104 is detected therein. These images/videos are used to identifywhen an alarm issued by the monitoring system 116 is a false alarm.False alarms can occur when active security tags are carried passed thepedestals 202 a, 202 b within the RSF 150 and/or when active securitytags are disposed on display equipment located within the read range ofthe monitoring system 116 as discussed below in relation to FIG. 8.

Referring now to FIGS. 4 and 5, there are shown illustrative antennapatterns 400, 500 for antennas 220 a, 220 b contained in pedestals 202a, 202 b. As is known in the art, an antenna radiation pattern is agraphical representation of the radiating (or receiving) properties fora given antenna as a function of space. The properties of an antenna arethe same in a transmit mode and a receive mode of operation. As such,the antenna radiation pattern shown is applicable for both transmit andreceive operations as described herein. The illustrative antenna fieldpatterns 400, 500 shown in FIGS. 4-5 are azimuth plane patternsrepresenting the antenna pattern in the x, y coordinate plane. Theazimuth pattern is represented in polar coordinate form and issufficient for understanding the inventive arrangements. The azimuthantenna field patterns shown in FIGS. 4-5 are a useful way ofvisualizing the direction in which the antennas 220 a, 220 b willtransmit and receive signals at a particular transmitter power level.

The antenna field pattern 400 shown in FIG. 4 includes a lobe 404 with apeak at ø=0°. Conversely, the antenna field pattern 500 shown in FIG. 5includes a lobe 504 with its peak at ø=180°. In the monitoring system116, each pedestal 202 a, 202 b is positioned so that the lobe of anantenna contained therein is directed into the EAS detection zone (orinterrogation zone) 350. Accordingly, a pair of pedestals 202 a, 202 bin the monitoring system 116 produce overlap in the antenna fieldpatterns 400, 500, as shown in FIG. 6. Notably, the antenna fieldpatterns 400, 500 shown in FIG. 6 are scaled for purposes ofunderstanding the present solution. In particular, the patterns show theouter boundary or limits of an area in which an exciter signal ofparticular amplitude applied to antennas 202 a, 202 b will produce adetectable response in an EAS security tag. However, it should beunderstood that a security tag within the bounds of at least one antennafield pattern 400, 500 will generate a detectable response whenstimulated by an exciter signal.

The overlapping antenna field patterns 400, 500 in FIG. 6 include anarea A where there is overlap of lobes 404, 504. It can also be observedin FIG. 6 that the lobe 404 of pedestal 202 a extends past the otherpedestal 202 b and into area C. Similarly, the lobe 504 of pedestal 202b extend past the other pedestal 202 a and into area B.

Area A between pedestals 202 a, 202 b defines at least a portion of theEAS detection zone 350 in which active security tags 104 should causethe monitoring system 116 to generate an alarm response. Security tagsin area A are stimulated by energy associated with an exciter signalwithin the lobes 404, 504 and will produce a response which can bedetected at each antenna. The response produced by a security tag inarea A is detected within the lobes of each antenna and processed in thesystem controller 210. This response signal is referred to herein as a“security tag signal” or an “RFID response signal”.

Notably, a security tag in areas B or C will also be excited by theantennas 202 a, 202 b. The RFID response signal produced by a securitytag in these areas B and C will also be received at one or bothantennas, and therefore will cause false alarming by the monitoringsystem 116.

As noted above in relation to FIGS. 2-3, at least one camera 108 a, 108b is advantageously mounted on, above or adjacent to pedestal 102 aand/or 102 b. Cameras are well known in the art, and therefore will notbe described herein. Any known or to be known camera can be used hereinwithout limitation. For example, camera chips with embedded ArtificialIntelligence (“AI”) may be employed here. The camera chips can include,but are not limited to, a smart camera with embedded AI available fromHorizon Robotics of Beijing, China. Generally, each camera 108 a, 108 bis configured to: locate and track people, packages, objects andenvironmental conditions (e.g., door motion, the presence of a shoppingcart, the presence of a restocking cart, the presence of a pallet ofitem, and/or the presence of another metal or glass item) in an areaaround the respective pedestal; and capture images of the area aroundthe respective pedestal. Metadata is generated by the camera thatindicates (1) the presence of a detected person/package/object in atleast area A, (2) a location of the detected person/package/object in atleast area A, (3) the type of person/package/object in at least area A,and/or (3) environmental conditions (e.g., motion of door 204) in atleast area A. The term “metadata”, as used herein, refers to a set ofdata that describes or gives information about other data (e.g., aboutthe contents of images and/or videos). This metadata can be communicatedto the system controller 210 for use in identifying false alarming bythe monitoring system 116. The cameras can also capture images. Theseimages may or may not be communicated to the system controller 210 inaddition to the metadata depending on a given application.

The area covered by the camera can include at least area A. Notably, thecameras are not shown in FIG. 6 for simplicity of illustration. Forexample in some scenarios, camera 108 a is disposed on the front ofpedestal 202 a so that it covers area A. Similarly, camera 108 b isdisposed on the front of pedestal 202 b so that it also covers area A.Each camera 108 a-108 b is shown in FIG. 2 as being located in themiddle of the vertically elongate pedestals. However, each camera can belocated at any location on the respective pedestal in accordance with agiven application. For example, each camera 108 a, 108 b is located atthe top center of the pedestal. Additionally, any number of cameras canbe provided with each pedestal. The total number of cameras on eachpedestal is selected in accordance with a given application. The presentsolution is not limited to the particulars of this example. As notedabove, the cameras can alternatively reside in the ceiling or on a walladjacent to the pedestals.

The camera(s) are controlled and provided power from the RFID reader orsystem controller 210. 1-wire technology may be employed to providedata, power and RF. In some scenarios, the camera(s) use less than 1 mWcontinuous and the data rate of the metadata is low enough to besupported by 1-wire technology. So, one or more cameras may be added toa 1-wire bus of system 100 for easy integration with an RFID reader.

The cameras provide the RFID reader or system controller 210 withreal-time contextual information about the presence ofpeople/packages/objects, the location of the same, and a direction oftravel of the same. In the case that a person is detected by a camera,the camera can also provide real-time contextual information about (1)whether or not an item is in the EAS detection zone at the same time aperson is in the EAS detection zone, (2) whether or not the person iscarrying any items, (3) the type of person in the EAS detection zone(e.g., customer or employee), and/or (4) the types of the items detectedin the EAS detection zone. The real-time contextual information is thenused by the system controller 210, monitoring system 116, server 118,and/or computing device 124 to identify false alarm scenarios.

It should be noted that the two pedestals 202 a, 202 b can be activatedat the same time or in a multiplexed manner. In the multiplexedscenarios, the pedestals 202 a, 202 b are activated in an alternatingmanner. For example, at a first time, pedestal 202 a is activated andpedestal 202 b is deactivated. At a second time, pedestal 202 a isdeactivated and pedestal 202 b is activated.

Referring now to FIG. 7, there is provided a block diagram that isuseful for understanding the arrangement of the system controller 210.The system controller 210 comprises a processor 716 (such as amicro-controller or Central Processing Unit (“CPU”)). The systemcontroller also includes a computer-readable storage medium (such asmemory 718) on which is stored one or more sets of instructions (e.g.,software code) configured to implement one or more of the methodologies,procedures or functions described herein. The instructions can alsoreside, completely or at least partially, within the processor 716during execution thereof by the system controller 210. The memory 718and the processor 716 also can constitute machine-readable media. Theterm “machine-readable media”, as used here, refers to a single mediumor multiple media (e.g., a centralized or distributed database, and/orassociated caches and servers) that store the one or more sets ofinstructions. The term “machine-readable media”, as used here, alsorefers to any medium that is capable of storing, encoding or carrying aset of instructions for execution by the system controller 210 and thatcause the system controller 210 to perform any one or more of themethodologies of the present disclosure.

The instructions (i.e., computer software) can include an EAS detectionmodule 720 to facilitate EAS detection and perform methods for issuingalarms, identifying false alarms, and/or suppressing alarm issuance forfalse alarms, as described herein. The instructions can also include acamera module 750 to (a) cause images/videos to be captured by at leastone camera coupled to or disposed in proximity to a pedestal, (b) causethe images/videos to be communicated from the camera to the systemcontroller 210, (c) cause metadata to be communicated from the camera tothe system controller 210, (d) receive data from external sensordevices, tag readers and other cameras disposed in proximity to displayequipment located in a read range of the monitoring system(s) 116, (e)process images, videos, metadata, sensor data, and/or tag read data todetermine whether or not a false alarm scenario exists, and/or (e)provide indications of false alarm scenarios to the processor 716 foruse in controlling antenna's 202 a, 202 b. These instructions can alsoreside, completely or at least partially, within the processor 716during execution thereof.

The system also includes at least one EAS transceiver 708, includingtransmitter circuitry 710 and receiver circuitry 712. The transmitterand receiver circuitry are electrically coupled to antenna 202 a and theantenna 202 b. A suitable multiplexing arrangement can be provided tofacilitate both receive and transmit operation using a single antenna(e.g., antenna 202 a or 202 b). Transmit operations can occurconcurrently at antennas 202 a, 202 b after which receive operations canoccur concurrently at each antenna to listen for security tags whichhave been excited. Alternatively, transmit operations can be selectivelycontrolled as described herein so that only one antenna is active at atime for transmitting interrogation signals. The antennas 202 a, 202 bcan include an upper and lower antenna similar to those shown anddescribed with respect to FIG. 2. Input signals applied to the upper andlower antennas can be controlled by transmitter circuitry 710 orprocessor 716 so that the upper and lower antennas operate in a phaseaiding or a phase opposed configuration as required.

Additional components of the system controller 210 can include acommunication interface 724 configured to facilitate wired and/orwireless communications from the system controller 210 to a remotelylocated EAS system server 118 or computing device 124. The systemcontroller can also include a real-time clock 725 which is used fortiming purposes, and an alarm 726 (e.g., an audible alarm, a visualalarm, or both) which can be activated when an active EAS security tagis detected thereby (e.g., in zone 350 of FIG. 3, zone A of FIG. 6, zoneB of FIG. 6, and/or zone C of FIG. 6). A power supply 728 providesnecessary electrical power to the various components of the systemcontroller 210. The electrical connections from the power supply to thevarious system components are omitted in FIG. 7 so as to avoid obscuringthe present solution.

Those skilled in the art will appreciate that the system controllerarchitecture illustrated in FIG. 7 represents one possible example of asystem architecture that can be used with the present solution. However,the present solution is not limited in this regard and any othersuitable architecture can be used in each case without limitation.Dedicated hardware implementations including, but not limited to,application-specific integrated circuits, programmable logic arrays, andother hardware devices can likewise be constructed to implement themethods described herein. It will be appreciated that the apparatus andsystems of various inventive embodiments broadly include a variety ofelectronic and computer systems. Some embodiments may implementfunctions in two or more specific interconnected hardware modules ordevices with related control and data signals communicated between andthrough the modules, or as portions of an application-specificintegrated circuit. Thus, the illustrative system is applicable tosoftware, firmware, and hardware implementations.

Referring now to FIG. 8, there is provided a diagram that is useful forunderstanding the present solution. As shown in FIG. 8, displayequipment 108 ₁, 108 ₂ is placed in proximity to pedestals 202 a, 202 b.More specifically, display equipment 108 ₁ is located in area B behindpedestal 220 a, and display equipment 108 ₂ is located in area C behindpedestal 220 b. Accordingly, active security tags 104 disposed on thedisplay equipment 108 ₁, 108 ₂ are read by the monitoring system 116.These reads cause the monitoring system 116 to issue alarms. Thesealarms are false alarms of theft since the items are not being carriedthrough the EAS detection zone 350 or area A. The present solutionprovides a way to identify such false alarms with a relatively highdegree of confidence and suppress alarm issuance in response to suchfalse alarm identifications.

Referring now to FIG. 9, there is provided an illustration that isuseful for understanding how the present solution identifies false alarmscenarios. As shown in FIG. 9, cameras 106 ₁, 106 ₂ are provided in theceiling above display equipment 108 ₁. Camera 106 ₁ has a FOV 902 covinga first portion of display equipment 108 ₁, while camera 106 ₂ has a FOV904 covering a second portion of display equipment 108 ₁. The areacovered by FOV 902 defines a first monitored zone 906, and the areacovered by FOV 904 defines a second monitored zone 908. The cameras 106₁, 106 ₂ can continuously capture images/videos, periodically captureimages/videos at pre-defined times, and/or capture images/videos inresponse to trigger events. The trigger events can include, but are notlimited to, motion detected by PIR sensors 112 ₁, 112 ₂ in therespective monitored zones 906, 908. The images/videos are stored in adatastore 120, 128 and/or 718 along with timestamps for later use inidentifying false alarms.

A vibration sensor 112 ₃ is also coupled to the display equipment 108 ₁.The vibration sensor 112 ₃ detects when the display equipment 108 ₁and/or objects 102 ₁, 102 ₂ disposed thereon are touched by a person910, 912. Sensor data generated by the sensor 112 ₃ is stored in adatastore 120, 128 and/or 718 along with timestamps for later use inidentifying false alarms.

The person can include a customer 910 or an employee 912. The sensordata generated by sensors 112 ₁, 112 ₂, 112 ₃ is not sufficient forclassifying the person as a customer or an employee. However, the personcan be classified based on results of an analysis of the image/videodata generated by cameras 106 ₁, 106 ₂. The person's classification canalso assist in identifying false alarm scenarios as described below.

A tag reader 110 ₁ may further be disposed on or adjacent to the displayequipment 108. The tag reader 110 ₁ has a read range that includes thefirst and second monitored zones 906, 908. The tag reader 110 ₁ readsactive security tags in the first and second monitored zones 906, 908 ona continuous basis, a periodic basis at pre-defined intervals, or inresponse to trigger events (e.g., N seconds or minutes after an imagecapture by camera 106 ₁ or 106 ₂). Tag read data generated by tag reader110 ₁ is then stored in the data store 120, 128 and/or 718 along withtimestamps for later use in identifying false alarms as described below.

A white list of objects can be manually created by a person (e.g., anemployee operator) or specified by a planogram. Alternatively, the whitelist of objects is generated based on the tag read data generated bymonitoring system 116 and/or tag reader 110 ₁ during off or non-businesshours. The white list provides a way to determine when an alarm causedby a white listed object is a false alarm. An illustration of anillustrative white list stored as a table 1000 in a data store isprovided in FIG. 10. As shown in FIG. 10, the white list table 1000comprises various information for each piece of display equipment 108 ₁,108 ₂ located in a read range of the monitoring system 116. Thisinformation includes, but is not limited to, identifications formonitored zones 906, 908, . . . , X associated with the respectivedisplay equipment, identification information for objects 102 ₁, 102 ₂,. . . , 102 _(N) disposed on the respective display equipment,identification information for security tags 104 ₁, 104 ₂, . . . , 104_(N) coupled to the objects, and identification information for otherdevices 106, 110, 112 associated with the respective display equipment.The table is used to access respective image/video, sensor data and/ortag read data when an active white listed tag is detected by the EASdetection system 114. The accessed image/video data, sensor data and/ortag read data is then used to determine whether or not a false alarmscenario exists in relation to the white listed tag's detection by theEAS detection system 114, as discussed below.

Another aspect of the present solution is to allow the system 100 toauto-configure itself so as to minimize time spent setting it up.Calibration or registration marks can be added to the zones to bemonitored. A mobile device (e.g., a smart phone or tablet) can beprovided that allows easy marking of monitored zones. If enough tagreaders are placed in an area that allows a tag's location to bedetermined within a relatively small zone, then security tags can beassociated with relatively small monitored zones which helps to increasethe confidence of a false alarm identification.

Illustrative Methods for Operating an EAS Detection System

Referring now to FIG. 11, there is provided a flow diagram of anillustrative method 1100 for operating an EAS detection system (e.g.,EAS detection system 114 of FIGS. 1-8). Method 1100 begins with 1102 andcontinues with 1104 where the EAS detection system performs operationsto read security tags during off hours and/or generate/update/access awhite list table (e.g., white list table 1000 of FIG. 10) in accordancewith the tag reads. Next in 1106, the EAS detection system performsoperations to read a security tag (e.g., security tag 104 of FIG. 1, 104₁ of FIG. 9, or 104 ₂ of FIG. 9) during business hours. A uniqueidentifier for the security tag is included in the RFID response signal.The unique identifier is used in 1108 to determine if the security tagis coupled to an object that is identified in the white list table. 1108can involve comparing the unique identifier contained in the RFIDresponse signal with security tag identifiers contained in the whitelist table to determine if a match exists therebetween. If so, theobject (e.g., object 102 of FIG. 1, 102 ₁ of FIG. 9 or 102 ₂ of FIG. 9)to which the security tag is coupled is considered a white listedobject.

If the security tag is not coupled to a white listed object [1110:NO],then 1112 is performed where an alarm may be issued by the EAS detectionsystem. The alarm is issued if the system (e.g., system 100 of FIG. 1)confirms that a person and the object are traveling towards an exitthrough the EAS detection zone (e.g., EAS detection zone 350 of FIG. 3or zone A of FIG. 6) at the same time. This confirmation can be madebased on image analysis and/or sensor data analysis. Techniques formaking such a confirmation are known in the art, and therefore will notbe described herein. Any known or to be known technique for making sucha confirmation can be used herein. Otherwise, the alarm issuance issuppressed.

If the security tag is coupled to the white listed object [1110:YES],then 1114 is performed where the display equipment (e.g., displayequipment 108 of FIG. 1, 108 ₁ of FIG. 8, or 108 ₂ of FIG. 8) associatedwith the white listed object is identified using the white list table.Sensor data is then accessed for at least one motion detection sensor(e.g., vibration sensor 112 ₃ of FIG. 9) associated with the identifieddisplay equipment, as shown in 1116. The sensor data is analyzed todetermine if motion was detected during a period of time (e.g., 5minutes) prior to the tag read in 1106. If not [1118:NO], then 1120 isperformed where a false alarm scenario conclusion is made, EAS detectionalarming is suppressed, and/or method 1100 continues with 1144 of FIG.11B. In 1144, method 1100 ends or other processing is performed (e.g.,return to 1106).

If so [1118:YES], then 1122 is performed where tag read data is accessfor at least one tag reader (e.g., tag reader 110 of FIG. 1 or 110 ₁ ofFIG. 9) associated with the identified display equipment. The tag readdata is analyzed to determine if the security tag has been read by thetag reader during a period of time (e.g., 5-60 minutes) prior to the tagread of 1106. If so [1124:YES], then 1126 is performed where a falsealarm scenario conclusion is made, EAS detection alarming is suppressed,and/or method 1100 continues with 1144 of FIG. 11B. In 1144, method 1100ends or other processing is performed (e.g., return to 1106).

If not [1124:NO], then method 1100 continues with 1128 of FIG. 11B. Asshown in 11B, 1128 involves accessing first image/video data generatedby at least one camera (e.g., camera 106 of FIG. 1, 106 ₁ of FIG. 9and/or 106 ₂ of FIG. 9) associated with the identified display equipmentand/or a particular zone (e.g., monitored zone 906 or 908 of FIG. 9) ofthe identified display equipment. The first image/video data is analyzedto determine if a person (e.g., person 910 or 912 of FIG. 9) was closeto (e.g., within in 2 feet of) the identified display equipment during aperiod of time (e.g., 5-60 minutes) prior to the tag read of 1106. If so[1130:YES], method 1100 continues to 1146 of FIG. 11C which will bediscussed below. If not [1130:NO], then method 1100 continues with 1132where a determination is made as to whether an inanimate object wasclose to (e.g., within in 2 feet of) the identified display equipmentduring a period of time prior to the tag read of 1106. If not [1132:NO],then 1134 is performed where a false alarm scenario conclusion is made,EAS detection alarming is suppressed, and/or method 1100 continues with1144 of FIG. 11B. In 1144, method 1100 ends or other processing isperformed (e.g., return to 1106).

If so [1132:YES], then 1136 is performed where image analysis isperformed to classify the inanimate object as an order-fulfilling robot,a restocking robot, merchandise or other object (e.g., a shopping cart).If the inanimate object is classified as an order-fulfilling robot[1138:YES], then 1140 is performed where the EAS detection system issuesan alarm. Otherwise [1138:NO], 1142 is performed where a false alarmscenario conclusion is made, EAS detection alarming is suppressed,and/or method 1100 continues with 1144 of FIG. 11B. In 1144, method 1100ends or other processing is performed (e.g., return to 1106).

Referring now to FIG. 11C, method 1100 continues with 1146 when theimage/video analysis of 1128 indicates that a person is close to (e.g.,within 2 feet of) the identified display equipment during the period oftime prior to the tag read of 1106. In 1146, image analysis is performedto classify the person as a customer or an employee.

If the person is classified as an employee [1148:NO], then 1150 isperformed where a false alarm scenario conclusion is made, EAS detectionalarming is suppressed, and/or method 1100 continues with 1164. In 1164,method 1100 ends or other processing is performed (e.g., return to1106).

If the person is classified as a customer [1148:YES], then 1152 isperformed where second image/video data is accessed for a camera (e.g.,camera 108 a and/or 108 b of FIGS. 2-3) located at the exit. Theaccessed second image/video data including data generated by the camerawithin a given amount of time (e.g., 1 minute) before and after the tagread of 1106. The second image/video data is analyzed to determine if aperson seen therein. If not [1154:NO], then method 1100 continues with1160 which will be discussed below.

If so [1154:YES], then a decision is made as to whether the person inthe second image/video is the customer seen in the first image/video. Ifnot [1156:NO], then method 1100 continues with 1160 which will bediscussed below.

If so [1156:YES], then a decision is made as to whether the object inthe second image/video is of the same type as the white listed object.If not [1158:NO], then method 1100 continues with 1160 where a falsealarm scenario conclusion is made, EAS detection alarming is suppressed,and/or method 1100 continues with 1164. In 1164, method 1100 ends orother processing is performed (e.g., return to 1106).

If so [1158:YES], then 1162 is performed where an alarm is issued by theEAS detection system. Subsequently, 1164 is performed where method 1100ends or other processing is performed (e.g., return to 1106).

Although the present solution has been illustrated and described withrespect to one or more implementations, equivalent alterations andmodifications will occur to others skilled in the art upon the readingand understanding of this specification and the annexed drawings. Inaddition, while a particular feature of the present solution may havebeen disclosed with respect to only one of several implementations, suchfeature may be combined with one or more other features of the otherimplementations as may be desired and advantageous for any given orparticular application. Thus, the breadth and scope of the presentsolution should not be limited by any of the above describedembodiments. Rather, the scope of the present solution should be definedin accordance with the following claims and their equivalents.

What is claimed is:
 1. A method for operating an Electronic Article Surveillance (“EAS”) detection system, comprising: detecting, by the EAS detection system, an alarm of a tag of the system; and determining whether or not the alarm is a false alarm by: determining whether the alarmed tag was on display within a detection zone of the system prior to the alarm; and performing the following operations when a determination is made that the alarmed tag was on display: accessing sensor data generated by at least one sensor device disposed on or near display equipment associated with the alarmed tag; and determining, based on the sensor data, whether a person was within a defined distance range of the alarmed tag during a period of time immediately preceding the detecting; and suppressing an issuance of the alarm by the EAS detection system in response determining that the person was not within the defined distance range of the alarmed tag during a period of time immediately preceding the detecting.
 2. The method according to claim 1, determining whether the alarmed tag was on display comprises performing operations by the EAS detection system to read security tags coupled to objects on display within the detection zone during off hours.
 3. The method according to claim 1, further comprising outputting an alarm by the system when a determination is made that the alarmed tag is not coupled to an object.
 4. The method according to claim 1, wherein the at least one sensor device comprises at least one of a motion sensor and a camera.
 5. The method according to claim 1, further comprising using the sensor data to classify the person as a customer or employee when a determination is made that the person was within the defined distance range of the alarmed tag during the period of time.
 6. The method according to claim 5, further comprising concluding that the alarm is a false alarm when the person is classified as an employee.
 7. The method according to claim 5, further comprising concluding that the alarm is a real alarm when the person is classified as a customer.
 8. The method according to claim 5, further comprising concluding that the alarm is a false alarm when (a) the person is classified as a customer and (b) image analysis indicates the customer is not an individual present in the EAS detection zone at the time of the detecting or that no individual was present in the EAS detection zone at the time of the detecting.
 9. The method according to claim 5, further comprising concluding that the alarm is a false alarm when (a) the person is classified as a customer and (b) image analysis indicates that an object to which the alarmed security tag is coupled is not the object present in the EAS detection zone at the time of the detecting.
 10. The method according to claim 1, further comprising using the sensor data to determine whether an inanimate object was within the defined distance range of the alarmed tag during the period of time immediately preceding the detecting.
 11. The method according to claim 10, further comprising concluding that the alarm is a false alarm when a determination is made that an inanimate object other than an order-fulfilling robot was within the defined distance range of the alarmed tag during the period of time.
 12. A system, comprising: a processor; and a non-transitory computer-readable storage medium comprising programming instructions that are configured to cause the processor to implement a method for operating an Electronic Article Surveillance (“EAS”) detection system, wherein the programming instructions comprise instructions to: detect, by the EAS detection system, an alarm of a tag of the system; and determining whether or not the alarm is a false alarm by: determine whether the alarmed tag was on display within a detection zone of the system prior to the alarm; and perform the following operations when a determination is made that the alarmed tag was on display: access sensor data generated by at least one sensor device disposed on or near display equipment associated with the alarmed tag; and determine, based on the sensor data, whether a person was within a defined distance range of the alarmed tag during a period of time immediately preceding the detecting; and suppress an issuance of the alarm by the EAS detection system in response determining that the person was not within the defined distance range of the alarmed tag during a period of time immediately preceding the detecting.
 13. The system according to claim 12, wherein the programming instructions further comprise instructions to cause the EAS detection system to read security tags coupled to objects on display within the detection zone during off hours.
 14. The system according to claim 12, wherein the programming instructions further comprise instructions to cause the EAS detection system to issue the alarm when a determination is made that the alarmed tag is not coupled to an object.
 15. The system according to claim 12, wherein the at least one sensor device comprises at least one of a motion sensor and a camera.
 16. The system according to claim 12, wherein the programming instructions further comprise instructions to use the sensor data to classify the person as a customer or employee when a determination is made that the person was within the defined distance range of the alarmed tag during the period of time.
 17. The system according to claim 16, wherein the programming instructions further comprise instructions to conclude that the alarm is a false alarm when the person is classified as an employee.
 18. The system according to claim 16, wherein the programming instructions further comprise instructions to conclude that the alarm is a real alarm when the person is classified as a customer.
 19. The system according to claim 16, wherein the programming instructions further comprise instructions to conclude that the alarm is a false alarm when (a) the person is classified as a customer and (b) image analysis indicates the customer is not an individual present in the EAS detection zone at the time of the detecting or that no individual was present in the EAS detection zone at the time of the detecting.
 20. The system according to claim 16, wherein the programming instructions further comprise instructions to conclude that the alarm is a false alarm when (a) the person is classified as a customer and (b) image analysis indicates that an object to which the alarmed tag is coupled is not the object present in the EAS detection zone at the time of the detecting. 