Item movement tracking with three-dimensional (3d) proximity exclusions

ABSTRACT

Changes of a vertical and horizontal position of an item are programmatically monitored relative to at least one three-dimensional (3D) item-specific proximity exclusion attribute that precludes movement of the item into a defined 3D item-configured prohibited region by iteratively querying an item tag of the item for measured vertical and horizontal coordinates of the item tag. In response to determining that a detected change of at least one of the vertical and horizontal position of the item results in the item being located within the defined 3D item-configured prohibited region, an item-specific proximity exclusion alert is generated indicating that the item is located within the defined 3D item-configured prohibited region.

BACKGROUND

The present invention relates to inventory management and theftprevention in retail environments. More particularly, the presentinvention relates to item movement tracking with three-dimensional (3D)proximity exclusions.

Retail stores sell merchandise to consumers. The merchandise may bemanufactured from component products. The component products and theresulting manufactured merchandise may be shipped and stored at avariety of locations until purchased by consumers. Merchandise mayinclude clothing, consumer electronics, tools, chemicals (e.g.,fertilizers, insecticides, etc.), and other retail goods.

SUMMARY

A method includes programmatically monitoring, by iteratively queryingan item tag of an item for measured vertical and horizontal coordinatesof the item tag, changes of a vertical and horizontal position of theitem relative to at least one three-dimensional (3D) item-specificproximity exclusion attribute that precludes movement of the item into adefined 3D item-configured prohibited region; and generating, inresponse to determining that a detected change of at least one of thevertical and horizontal position of the item results in the item beinglocated within the defined 3D item-configured prohibited region, anitem-specific proximity exclusion alert indicating that the item islocated within the defined 3D item-configured prohibited region.

A system that performs the method and a computer program product thatcauses a computer to perform the method are also described.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is a block diagram of an example of an implementation of a systemfor item movement tracking with three-dimensional (3D) proximityexclusions according to an embodiment of the present subject matter;

FIG. 2 is a block diagram of an example of an implementation of a coreprocessing module capable of performing item movement tracking withthree-dimensional (3D) proximity exclusions according to an embodimentof the present subject matter;

FIG. 3 is a flow chart of an example of an implementation of a processfor item movement tracking with three-dimensional (3D) proximityexclusions according to an embodiment of the present subject matter; and

FIG. 4 is a flow chart of an example of an implementation of a processfor item movement tracking with three-dimensional (3D) proximityexclusions that includes both configuration and monitoring of proximityexclusions according to an embodiment of the present subject matter.

DETAILED DESCRIPTION

The examples set forth below represent the necessary information toenable those skilled in the art to practice the invention and illustratethe best mode of practicing the invention. Upon reading the followingdescription in light of the accompanying drawing figures, those skilledin the art will understand the concepts of the invention and willrecognize applications of these concepts not particularly addressedherein. It should be understood that these concepts and applicationsfall within the scope of the disclosure and the accompanying claims.

The subject matter described herein provides item movement tracking withthree-dimensional (3D) proximity exclusions. The present technologysolves a recognized product and security management problem by providinga new form of computing technology and computational processing thattracks item locations and movement of one or more items intolocations/structures within commercial environments that are indicativeof risk. By use of the present technology, management and securitypersonnel may more efficiently focus on specific identified risks andrisk areas while allowing shoppers and workers to move freely throughthe commercial environment without intrusive monitoring where a risk hasnot been actually detected. The risks may include risks of theft, risksof chemical interaction dangers, and other risks associated withplacement, manufacture, shipping, storage, and sale of merchandise andcomponents used to manufacture merchandise. Proximity exclusions may beestablished for items as minimum distance criteria relative either toone or more exclusionary control points (e.g., “keep-out” areas,locations identified as high risk, etc.) or relative to other items(e.g., items identified with interaction dangers). The proximityexclusions may further be established within a three-dimensional (3D)space/grid and may be used to define either or both of vertical andhorizontal proximity exclusions into which configured items may not bemoved without generating an alert. If an item that is configured with aproximity exclusion is determined to have been moved into a keep-outarea, a proximity exclusion alert may be generated to prompt storemanagement and/or security personnel to further review the situation. Acamera image captured contemporaneously with the detected movement maybe forwarded to security personnel and a particular subject or area maybe highlighted for further scrutiny and review.

Exclusionary control points may be configured as keep-out areas of aretail environment (e.g., restrooms, dressing rooms, etc.) within whicha consumer may be prohibited from moving a particular item or categoryof item. Alternatively, items may be configured with proximityexclusions to detect movement of items into proximity with one another(e.g., volatile combinations, such as bleach and ammonia, etc.). Assuch, the proximity exclusions may operate as mutual exclusions betweenitems and either the control point(s) or between one another. Item tagsand proximity exclusion sensors may be utilized to enforce proximityexclusions, and the item tags and proximity exclusion sensors may beimplemented using a variety of different technologies, as discussed inmore detail below.

For purposes of the present description, a commercial environment mayinclude a retail environment, warehouse, or other environment withinwhich items are to be tracked to enforce proximity exclusions, asappropriate for the given implementation. It is understood that astructure associated with a retail environment may include astructure/building of the commercial environment itself, a partitionedportion of a building (e.g., a dressing room), a cargo truck containerbed, a cab of a cargo truck, a fenced warehouse area, or any otherstructure or container that may be associated with a commercialenvironment for which proximity exclusions are to be enforced.

Regarding vertical proximity exclusions, the present technology maydetect a consumer or store clerk moving an item configured with avertical proximity exclusion vertically into one or more verticalkeep-out regions (e.g., above or below an acceptable height or verticalelevation safety range) while shopping for or stocking items,respectively. The vertical keep-out regions may, for example, prohibitmovement of the item vertically above shoulder level or below knee levelas the range in-between may be considered typical during a normalshopping experience or during normal shelf stocking in a commercialenvironment. However, if the item is detected to be moved higher (e.g.,above the shopper's shoulders such as being placed under/within a hat orscarf, or above a safe height for retrieval for a fragile or heavy item)or is detected to be moved lower (e.g., below the shopper's knees suchas being placed within a shoe/boot or sock, or below a safe height foraccess by children), a proximity exclusion alert may be generated toprompt store management and/or security personnel to monitor thesituation. As such, by detecting movement into a vertical keep-outregion within a retail or warehouse environment, the present technologymay be utilized to detect and alert workers and security personnel toprotect against potential safety risks to workers and consumers and/orto protect against potential theft.

Regarding horizontal proximity exclusions, the present technology maydetect a consumer moving an item that is configured with a horizontalproximity exclusion into horizontal keep-out regions, such as a dressingroom or rear exit door area, within or near which customers areprohibited from taking merchandise. In such a situation, the dressingroom may be configured as an exclusionary control point, and items maybe detected as entering proximity of the exclusionary region based upona distance relative to the exclusionary control point.

Proximity exclusions may be configured with time-based criteria in theform of a time-based proximity threshold that allows temporarydeviations for a configured time period beyond which a proximityexclusion alert may be generated. Time deviations may be configured asappropriate for a given implementation, such as between five (5)seconds, ten (10) seconds, or some other threshold of time asappropriate for the given implementation.

As such, if an item with a vertical proximity exclusion is merelydropped during a retail shopping experience or falls off of a shelfduring shopping or stocking, but is picked back up by the consumer or astore clerk such that it is back within the acceptable vertical heightrange within the configured time period, the vertical proximityexclusion alert may not be triggered. Similarly, if a customer walksnear an entry door of a dressing room with an item configured with ahorizontal proximity exclusion, but continues walking past the area withthe item in a reasonable amount of time, the horizontal proximityexclusion alert may not be triggered. Accordingly, the time-basedcriteria provide a form of time-based proximity hysteresis that may beutilized to avoid unnecessary triggering of proximity exclusion alertsin circumstances that are determined to be corrected in a timely manner.This allows shoppers and workers to move freely through the commercialenvironment without having to be monitored by security personnel.

The horizontal proximity exclusions may also be configured with atime-based proximity threshold to provide notification hysteresis todetect potential tag tampering and/or removal of tags from items, whileavoiding triggering proximity exclusion alerts in circumstances that arecorrected in a timely manner. For example, where a store layout has adressing room configured as an exclusionary control point that issituated at a corner that protrudes into a shopping region, a shoppermay be allowed to walk by the corner without triggering a proximityexclusion alert. Alternatively, where shoppers are allowed to takeclothing into a dressing room that is configured as an exclusionarycontrol point, clothing items may be configured with time-based criteriato avoid extended times in the dressing room, while other items (e.g.,jewelry, electronics, clothing of an opposite gender relative to theshopping area, etc.) may be configured with absolute proximityexclusions to avoid allowing the items to be taken into the respectivedressing room.

As such, the present technology provides an efficient flexible itemtracking and control system that also incorporates hysteresis to predictwhen an item is either at risk of being improperly taken into anexclusionary keep-out area, or at risk of exposure to another item orplaced in a location that creates a physical risk to persons andproperty. The proximity exclusions operate to exclude unauthorizedtransport of items into excluded regions and/or structures where theitems are not intended to be moved, or to exclude unauthorized transportof one or more items into proximity of another item. The terms “item,”“component,” “product,” and “merchandise” are used generallyinterchangeably herein for ease of reference.

Many different types of proximity attributes may be used to track itemsrelative to proximity exclusion keep-out regions, and to detect movementof an item and a resulting location of the item within a prohibitedregion within a structure associated with the commercial environment.Example proximity attributes include latitude, longitude, speed,acceleration, altitude, and other attributes that may be used to detectactual or pending proximity of a particular tag to one or more keep-outregions.

Technology usable to implement the proximity exclusions includealtimeter-based sensor technology, global positioning system (GPS)technology, radio frequency identification (RFID) technology, gyroscopetechnology, velocity and/or acceleration sensing technologies, and othertechnologies as appropriate for a given implementation. Further,frequency-based technologies may be used, such as where items areconfigured to generate a particular frequency, where differentfrequencies detected by a sensor indicate two items are within amutually-exclusive prohibited proximity of each other, or wheredetection of a particular frequency by a sensor in a prohibited regionindicates proximity of an item that generates the frequency detected bythe sensor is within the prohibited region. As another alternative,signal strength variation technology may be used, where signaltransmission strength is tuned to a particular distance, which may beused to detect proximity of items either to each other or to a sensorwithin a prohibited region.

Additionally, these different types of technologies may be used incombination to implement a particular form of proximity exclusion. Forexample, two RFID tags may be configured as mutually exclusive RFIDtags, where either or both tags may be configured to generate an RFIDbeacon detectable by the other tag or by an RFID sensor if the two tagsare placed into proximity with one another (e.g., either vertically orhorizontally). Alternatively, an RFID sensor may be configured within ahorizontal or vertical keep-out region, and may detect an RFID tag thatis configured to be excluded from the respective keep-out regionentering proximity of the RFID sensor.

As another example, where an altimeter-based sensor is utilized toimplement a vertical proximity exclusion, RFID technology may be used incombination by placing a stationary RFID sensor at or suspended from aceiling and/or along a shelf or on a floor of a retail environment.Altimeter sensor readings may be used in combination with detection ofan RFID tag on an item coming into proximity with one of the stationaryproximity sensors to detect whether the item is entering one of therespective vertical keep-out regions (e.g., leaving an acceptablevertical elevation range for the item).

As another alternative, where GPS technology is used to determine GPScoordinates of an item in a retail environment, RFID technology mayagain be used in combination by placing a stationary RFID sensor withina horizontal keep-out region of a retail environment (e.g., within adressing room). GPS readings may be used in combination with detectionof an RFID tag on an item coming into proximity with the stationaryproximity sensor to detect whether the item is entering the horizontalkeep-out region.

Many other possibilities of technology and combinations of technologymay be utilized to implement the present technology. It should beunderstood that any form of underlying technology may be utilized toimplement the present subject matter, as appropriate for the givenimplementation. Additionally, distributed or centralized control may beutilized, as appropriate for a given implementation.

Item tags may also be configured with a category identifier (ID)designating a particular category or type of item. Alternatively, itemstags may be configured with a unique item ID to allow tracking ofindividual items. These category IDs or item IDs may also be used todetect that a particular tag has been moved into an excluded region(again horizontal or vertical) that has been designated as a keep-outarea for items of a specific category or for the particular item,respectively. For example, a category tag that has been associated witha high-value item category (e.g., jewelry, video games, etc.) may raisea proximity exclusion alert if it is detected to have been moved into adressing room.

When a tagged item meets the configured exclusionary criterion, such ashaving been moved into the specifically designated keep-out area(s), oras having been moved out of its home area for longer than apre-configured time limit, a proximity exclusion alert may be generatedand may appear on the console in a security management office. The mostrecent security camera image associated with the tag's current 3D gridlocation in the environment may also be displayed to further assistsecurity personnel with identifying which person is in possession of theitem for which the proximity exclusion alert has been generated.

There may also be more than one potential person in a particular image,in which case the security officer may choose to instruct the securitycamera to continue to follow the tag as it moves through the 3D grid,allowing more precise identification of the person with the item. Thismay allow security personnel to effectively determine whether to furtherinvestigate, or whether the movement of the item is reasonably explainedby the circumstances. For example, where a high-value item (e.g.,jewelry, a video game, etc.) is carried into the changing room, securitypersonnel may choose to watch for the person leaving the room to ensurethe person is still openly carrying the high-value item, or may postsomeone unobtrusively at the exit of the store in the event the item isno longer openly visible. In the circumstance where the person is openlycarrying the item after exiting the changing room, the presenttechnology may be used determine the risk is no longer present. In thecircumstance where the high-value item is not being openly carried bythe person after the person exits the changing room, the presenttechnology may be used to determine whether the person forgot thehigh-value item and left it in the dressing room because the tag may bedetected to still be located in the dressing room (e.g., the prohibitedarea). Alternatively, the present technology may detect that the tag isstill moving with the person even though not being openly carried by theperson. In the latter circumstance, vertical proximity detection mayfurther be used to determine whether the item is at a height proximateto the persons shoes/boots or hat, or in a middle range such as inside ashirt or jacket that is either worn or carried over the person's arm. Ifthe person attempts to exit the retail environment without paying forthe item, the present technology provides evidence by which securitypersonnel may not only question the person about the high-value item,but also question the person about the specific location where the itemis hidden. In either circumstance, the situation may be reasonably andeffectively monitored to avoid any unnecessary disruption of thecustomer's enjoyment and shopping experience while also mitigating risk.

It should be noted that conception of the present subject matterresulted from recognition of certain limitations associated with itemsecurity and safety in retail chains of commerce and within commercialenvironments. For example, it was observed that prior technologies affixtags to retail items that are deactivated at a point of sale (e.g., acheck-out counter), and that if a customer exits through a store exitwithout the tag deactivated an alert may sound. However, it wasdetermined that these prior technologies do not detect whether an itemis currently located within an identified potentially non-securelocation within the commercial environment itself, or whether anitem/tag has been tampered with within the commercial environment. Forexample, a shopper with merchandise such as jewelry may enter a locationwithin the structure of a commercial environment, such as a dressingroom, or corner that is obscured or hidden from view, where itemtracking tags may be physically removed or otherwise compromised. It wasfurther determined that in certain shipping or storage situations,certain types of chemicals must be maintained at particular distancesfrom one another for safety reasons (e.g., volatile combinations, suchas bleach and ammonia, etc.), or certain heavy or fragile items must notbe stored in high locations due to drop hazards (e.g., pallets of homeconstruction bricks, etc.). It was determined that each of these typesof situations relates to a risk that may be defined in terms of“proximity,” either of one or more particular items being proximate to aparticular location, or of one or more items being proximate to eachother, and that as such these types of situations impose “proximityrisks” in the form of product loss risks or safety risks, respectively,if not managed. It was further determined that prior technologies arenot capable of detecting these types of proximity risks, which oftenleads to potentially intrusive over-monitoring of shoppers and/orworkers, as well as excessive security personnel expenses. It wasdetermined that new smart technology was needed that mayprogrammatically detect potential proximity-based risk situations togenerate proximity exclusion alerts so that these types of proximityrisks may be mitigated without the need for overt and intrusivemonitoring of shoppers and workers. The present subject matter improvesitem and inventory tracking and helps control costs associated withsafety and security in commercial environments by providing forproximity exclusions, as described above and in more detail below. Assuch, improved risk control related to item movement may be obtainedthrough use of the present technology.

The item movement tracking with three-dimensional (3D) proximityexclusions described herein may be performed in real time to allowprompt detection of items being moved into keep-out regions. Forpurposes of the present description, real time shall include any timeframe of sufficiently short duration as to provide reasonable responsetime for information processing acceptable to a user of the subjectmatter described. Additionally, the term “real time” shall include whatis commonly termed “near real time”—generally meaning any time frame ofsufficiently short duration as to provide reasonable response time foron-demand information processing acceptable to a user of the subjectmatter described (e.g., within a portion of a second or within a fewseconds). These terms, while difficult to precisely define are wellunderstood by those skilled in the art.

FIG. 1 is a block diagram of an example of an implementation of a system100 for item movement tracking with three-dimensional (3D) proximityexclusions. A proximity exclusion tracking server 102 providesconfigurable monitoring and control of item movement tracking within acommercial environment (not shown). As described above, the commercialenvironment may be a retail environment, warehouse, or other environmentwithin which items are to be tracked to enforce proximity exclusions, asappropriate for the given implementation. It is understood that astructure associated with a retail environment may include astructure/building of a commercial environment itself, a partitionedportion of a building, a cargo truck container, a cab of a cargo truck,a fenced warehouse area, a dressing room, or any other structure orcontainer that may be associated with a commercial environment for whichproximity exclusions may be established. A security computing device 104may be used to configure proximity exclusion tracking, and maycommunicate via a network 106 with the proximity exclusion trackingserver 102 and with several other devices. The other devices include aproximity exclusion tag database 108, a camera_1 110 through a camera_N114, a proximity exclusion tag_1 116 through a proximity exclusion tag_M118, and a proximity exclusion sensor_1 120 through a proximityexclusion sensor_T 122. Collectively, the system 100 provides managementfor mutual exclusion of items from locations and/or from other itemswithin a commercial or other environment.

For example, one or more of the camera_1 110 through the camera_N 114and one or more of the proximity exclusion sensor_1 120 through theproximity exclusion sensor_T 122 may be located within a commercialenvironment. Further, the proximity exclusion tag_1 116 through theproximity exclusion tag_M 118 may be configured to be read by one ormore of the proximity exclusion sensor_1 120 through the proximityexclusion sensor_T 122 using a wireless query mechanism. Alternatively,the proximity exclusion tag_1 116 through the proximity exclusion tag_M118 may be configured to wirelessly broadcast information detectable bythe proximity exclusion sensor_1 120 through the proximity exclusionsensor_T 122, as appropriate for the given implementation.

Further, the respective proximity sensor(s) may be configured as aproximity exclusion control point, and may detect items configured witha proximity exclusion tag entering a location/proximity of theconfigured proximity exclusion control point. For example, a proximitysensor may be placed in a dressing room, and configured such that therespective location becomes a proximity exclusion control point.

Alternatively, the respective proximity sensor(s) may be configured at alocation to detect multiple items with tags configured with mutuallyproximity exclusions from coming into proximity of each other. Forexample, one or more proximity sensors may be located within a cargo bayof a truck to detect items with tags configured with mutually proximityexclusions being placed within the cargo bay of the truck, and aproximity exclusion alert may be generated if two such items aredetected to be located within proximity of each other as detectable bythe proximity sensor(s). Alternatively, one or more proximity sensorsmay be placed inside a warehouse doorway to detect items with tagsconfigured with mutually proximity exclusions being brought in on thesame pallet or placed in proximity to one another within the warehouse,and a proximity exclusion alert may be generated if two such items aredetected to be located within proximity of each other as detectable bythe proximity sensor(s). Many possibilities for establishment ofproximity exclusion control points and for establishment ofmutually-exclusive prohibited proximity detection are possible, and allsuch possibilities are within the scope of the present technology.

As will be described in more detail below in association with FIG. 2through FIG. 4, the proximity exclusion tracking server 102 and thesecurity computing device 104 may each provide automated item movementtracking with three-dimensional (3D) proximity exclusions. As such, thepresent technology may be implemented at a user computing device orserver device level, or by a combination of such devices as appropriatefor a given implementation. The automated item movement tracking withthree-dimensional (3D) proximity exclusions is based upon configurationof keep-out regions/zones for items. The keep-out regions may betwo-dimensional (2D) or three-dimensional (3D) keep-out zones, asdescribed above and in more detail below. Further, the keep-out regionsmay be configured for a particular item relative to a particularlocation or relative to another item. For mutual-item proximityexclusions, one or both items may be configured to generate a proximityexclusion alert if the respective configured proximity exclusion hasbeen breached. A variety of possibilities exist for implementation ofthe present subject matter, and all such possibilities are consideredwithin the scope of the present subject matter.

The network 106 may include any form of interconnection suitable for theintended purpose, including a private or public network such as anintranet or the Internet, respectively, direct inter-moduleinterconnection, dial-up, wireless, or any other interconnectionmechanism capable of interconnecting the respective devices.

The proximity exclusion tracking server 102 may include any devicecapable of providing data for consumption by a device, such as thesecurity computing device 104, via a network, such as the network 106.As such, the proximity exclusion tracking server 102 may include a webserver, application server, or other data server device.

The proximity exclusion tag database 108 may include a relationaldatabase, an object database, or any other storage type of device. Assuch, the proximity exclusion tag database 108 may be implemented asappropriate for a given implementation.

The camera_1 110 through the camera_N 114 may include any resolution ofimage capture capability appropriate for the given environment withinwhich the respective cameras are used, and may include night-visioncapabilities, along with either black and white imagery or colorimagery. The camera_1 110 through the camera_N 114 may incorporate oneor more of still image capture and motion image capture. The camera_1110 through the camera_N 114 may also be implemented as Internetprotocol (IP) cameras, wireless cameras, or may utilize another form ofcommunications technology to communicate captured images over thenetwork 106.

The proximity exclusion tag_1 116 through the proximity exclusion tag_M118 may be associated with a location within the environment and/or withan item itself based upon the particular form of proximity exclusionthat is being implemented. The proximity exclusion tag_1 116 through theproximity exclusion tag_M 118 may also incorporate any form oftechnology or combination of technologies, as described above, tofacilitate the sensing of one or more tags in proximity to a horizontaland/or vertical keep-out region. As such, the proximity exclusion tag_1116 through the proximity exclusion tag_M 118 may be implemented asappropriate for a given environment.

FIG. 2 is a block diagram of an example of an implementation of a coreprocessing module 200 capable of performing item movement tracking withthree-dimensional (3D) proximity exclusions. The core processing module200 may be associated with the proximity exclusion tracking server 102and/or the security computing device 104, as appropriate for a givenimplementation. As such, the core processing module 200 is describedgenerally herein, though it is understood that many variations onimplementation of the components within the core processing module 200are possible and all such variations are within the scope of the presentsubject matter.

Further, the core processing module 200 may provide different andcomplementary processing of tracking of proximity exclusions inassociation with each implementation. As such, for any of the examplesbelow, it is understood that any aspect of functionality described withrespect to any one device that is described in conjunction with anotherdevice (e.g., sends/sending, etc.) is to be understood to concurrentlydescribe the functionality of the other respective device (e.g.,receives/receiving, etc.).

A central processing unit (CPU) 202 (“processor”) provides hardware thatperforms computer instruction execution, computation, and othercapabilities within the core processing module 200. A display 204provides visual information to a user of the core processing module 200and an input device 206 provides input capabilities for the user.

The display 204 may include any display device, such as a cathode raytube (CRT), liquid crystal display (LCD), light emitting diode (LED),electronic ink displays, projection, touchscreen, or other displayelement or panel. The input device 206 may include a computer keyboard,a keypad, a mouse, a pen, a joystick, touchscreen, voice commandprocessing unit, or any other type of input device by which the user mayinteract with and respond to information on the display 204.

It should be noted that the display 204 and the input device 206 may beoptional components for the core processing module 200 for certainimplementations/devices, or may be located remotely from the respectivedevices and hosted by another computing device that is in communicationwith the respective devices. Accordingly, the core processing module 200may operate as a completely automated embedded device without directuser configurability or feedback. However, the core processing module200 may also provide user feedback and configurability via the display204 and the input device 206, respectively, as appropriate for a givenimplementation.

A communication module 208 provides hardware, protocol stack processing,and interconnection capabilities that allow the core processing module200 to communicate with other modules within the system 100. Thecommunication module 208 may include any electrical, protocol, andprotocol conversion capabilities useable to provide interconnectioncapabilities, as appropriate for a given implementation. As such, thecommunication module 208 represents a communication device capable ofcarrying out communications with other devices. For example, thecommunication module 208 may be used to read item tags or to receivesignaling from item tags that is indicative of the tag locationvertically, such as where the tag is configured with an altimeter, orother type of technology that may be used to document vertical movementof the item/tag. Alternatively, the communication module 208 may be usedto read item tags or to receive signaling from item tags that isindicative of the tag location horizontally, such as where the tag isconfigured with an accelerometer, gyroscope, or other type of technologythat may be used to document horizontal movement of the item/tag.

A memory 210 includes a proximity exclusion configuration and trackingstorage area 212 that stores proximity configuration information andproximity exclusions configured for one or more tags, stores environmentlayout information, and other information usable to implement the itemmovement tracking with three-dimensional (3D) proximity exclusionsdescribed herein. As will be described in more detail below, theinformation stored within the proximity exclusion configuration andtracking storage area 212 is used to monitor and track item locationsand movement within a variety of environments (e.g., manufacturing,shipping, retail, etc.) to identify locations of one or more items thatare indicative of risk (e.g., risks of theft, risks of chemicalinteraction dangers, and other risks associated with placement,manufacture, shipping, storage, and sale of merchandise and componentsused to manufacture merchandise).

It is understood that the memory 210 may include any combination ofvolatile and non-volatile memory suitable for the intended purpose,distributed or localized as appropriate, and may include other memorysegments not illustrated within the present example for ease ofillustration purposes. For example, the memory 210 may include a codestorage area, an operating system storage area, a code execution area,and a data area without departure from the scope of the present subjectmatter.

A proximity exclusion tracking module 214 is also illustrated. Theproximity exclusion tracking module 214 provides programmaticconfiguration of tags with proximity exclusions and provides tracking ofproximity exclusion tags for the core processing module 200, asdescribed above and in more detail below. The proximity exclusiontracking module 214 may utilize the communication module 208 tocommunicate with item tags (e.g., either querying the tags or receivingbeacon-type signals, etc.). The proximity exclusion tracking module 214may utilize other technologies as described above and in more detailbelow to track item tags. The proximity exclusion tracking module 214implements the automated item movement tracking with three-dimensional(3D) proximity exclusions of the core processing module 200.

It should also be noted that the proximity exclusion tracking module 214may form a portion of other circuitry described without departure fromthe scope of the present subject matter. Further, the proximityexclusion tracking module 214 may alternatively be implemented as anapplication stored within the memory 210. In such an implementation, theproximity exclusion tracking module 214 may include instructionsexecuted by the CPU 202 for performing the functionality describedherein. The CPU 202 may execute these instructions to provide theprocessing capabilities described above and in more detail below for thecore processing module 200. The proximity exclusion tracking module 214may form a portion of an interrupt service routine (ISR), a portion ofan operating system, a portion of a browser application, or a portion ofa separate application without departure from the scope of the presentsubject matter.

A global positioning system (GPS) module 216 provides positioninglocation coordinates usable for identifying locations and movement ofitems within an environment. Location identification and movementinformation generated by the GPS module 216 may be utilized by theproximity exclusion tracking module 214 to detect item proximityexclusion events that are indicative of items being moved into regionsof exclusion relative to a particular location or anotherproximity-exclusion tagged item.

A timer/clock module 218 is illustrated and used to determine timing anddate information, such as time-based criteria that allow temporarydeviations for a configured time period (e.g., temporal hysteresis), asdescribed above and in more detail below. As such, the proximityexclusion tracking module 214 may utilize information derived from thetimer/clock module 218 for time-based information processing activitiesassociated with the item movement tracking with three-dimensional (3D)proximity exclusions described herein.

The proximity exclusion tag database 108 is again shown within FIG. 2associated with the core processing module 200. As such, the proximityexclusion tag database 108 may be operatively coupled to the coreprocessing module 200 without use of network connectivity, asappropriate for a given implementation.

The CPU 202, the display 204, the input device 206, the communicationmodule 208, the memory 210, the proximity exclusion tracking module 214,the GPS module 216, the timer/clock module 218, and the proximityexclusion tag database 108 are interconnected via an interconnection220. The interconnection 220 may include a system bus, a network, or anyother interconnection capable of providing the respective componentswith suitable interconnection for the respective purpose.

Though the different modules illustrated within FIG. 2 are illustratedas component-level modules for ease of illustration and descriptionpurposes, it should be noted that these modules may include anyhardware, programmed processor(s), and memory used to carry out thefunctions of the respective modules as described above and in moredetail below. For example, the modules may include additional controllercircuitry in the form of application specific integrated circuits(ASICs), processors, antennas, and/or discrete integrated circuits andcomponents for performing communication and electrical controlactivities associated with the respective modules. Additionally, themodules may include interrupt-level, stack-level, and application-levelmodules as appropriate. Furthermore, the modules may include any memorycomponents used for storage, execution, and data processing forperforming processing activities associated with the respective modules.The modules may also form a portion of other circuitry described or maybe combined without departure from the scope of the present subjectmatter.

Additionally, while the core processing module 200 is illustrated withand has certain components described, other modules and components maybe associated with the core processing module 200 without departure fromthe scope of the present subject matter. Additionally, it should benoted that, while the core processing module 200 is described as asingle device for ease of illustration purposes, the components withinthe core processing module 200 may be co-located or distributed andinterconnected via a network without departure from the scope of thepresent subject matter. For a distributed arrangement, the display 204and the input device 206 may be located at a point of sale device,kiosk, security management location, or other location, while the CPU202 and memory 210 may be located at a local or remote server. Manyother possible arrangements for components of the core processing module200 are possible and all are considered within the scope of the presentsubject matter. It should also be understood that, though the proximityexclusion tag database 108 is illustrated as a separate component forpurposes of example, the information stored within the proximityexclusion tag database 108 may also/alternatively be stored within thememory 210 without departure from the scope of the present subjectmatter. Accordingly, the core processing module 200 may take many formsand may be associated with many platforms.

FIG. 3 through FIG. 4 described below represent example processes thatmay be executed by devices, such as the core processing module 200, toperform the automated item movement tracking with three-dimensional (3D)proximity exclusions associated with the present subject matter. Manyother variations on the example processes are possible and all areconsidered within the scope of the present subject matter. The exampleprocesses may be performed by modules, such as the proximity exclusiontracking module 214 and/or executed by the CPU 202, associated with suchdevices. It should be noted that time out procedures and other errorcontrol procedures are not illustrated within the example processesdescribed below for ease of illustration purposes. However, it isunderstood that all such procedures are considered to be within thescope of the present subject matter. Further, the described processesmay be combined, sequences of the processing described may be changed,and additional processing may be added or removed without departure fromthe scope of the present subject matter.

FIG. 3 is a flow chart of an example of an implementation of a process300 for item movement tracking with three-dimensional (3D) proximityexclusions. The process 300 represents a computer-implemented method ofperforming the technical processing described herein. At block 302, theprocess 300 configures, for at least one item in a commercialenvironment, a proximity exclusion that precludes movement of the atleast one item into a defined prohibited region within a structureassociated with the commercial environment. At block 304, the process300 detects movement of the at least one item within the structureassociated with the commercial environment. At block 306, the process300 determines whether the movement of the at least one item results inthe at least one item being located within the defined prohibited regionwithin the structure associated with the commercial environment. Atblock 308, the process 300 generates, in response to determining thatthe movement of the at least one item results in the at least one itembeing located within the defined prohibited region, a proximityexclusion alert indicating that the at least one item is located withinthe prohibited region.

FIG. 4 is a flow chart of an example of an implementation of a process400 for item movement tracking with three-dimensional (3D) proximityexclusions that includes both configuration and monitoring of proximityexclusions. The process 400 represents a computer-implemented method ofperforming the technical processing described herein. It should be notedthat the process 400 may be partitioned into two or more processes, suchas one process to configure proximity exclusions and another process tomonitor/track and detect proximity exclusions. Alternatively, theprocess 400 may be implemented as a multi-threaded process with separatethreads to manage different aspects of the real-time processing, such asone thread to manage configuration of proximity exclusions that may berelatively less time sensitive and another thread to manage criticalreal-time processing associated with detection and management ofproximity exclusions. The respective technical features are describedwithin a single process 400 herein for ease of description.

At decision point 402, the process 400 makes a determination as towhether a request to configure a proximity exclusion has been detected.For example, a user such as a store or warehouse clerk may initiate arequest to configure a proximity exclusion where, as described above, aproximity exclusion may be relative to one or more exclusionary controlpoints or relative to other items. In response to determining atdecision point 402 that a request to configure a proximity exclusion hasbeen detected, the process 400 prompts the user for proximity exclusioncriteria at block 404. The proximity exclusion criteria may includevertical and/or horizontal proximity attributes that designate absoluteor referential keep-out regions associated with one or more structuresassociated with a commercial environment. The proximity exclusionattributes may include keep-out zone(s), altitudes, altitude ranges,distances, velocities, speeds, and other forms of attributes relative toexclusionary control points or other items/tags. The proximity exclusionattributes may also include item and/or category exclusion criteria.

At block 406, the process 400 receives proximity exclusion criteria fromthe user. At block 408, the process 400 configures one or more item tagsand/or an exclusionary control point with the proximity exclusioncriteria. The processing at block 408 may include configuring a mutualproximity exclusion between two items that defines a prohibited relativemutually-exclusive region that precludes movement of either one of thetwo items into proximity of the other one of the two items. As such,where the proximity exclusion is relative to another item (e.g., where achemical reaction may occur if two chemicals are proximately located),tags associated with each item may be configured with the proximityexclusion criteria. Additionally, the processing at block 408 mayinclude configuring a commercial environment tag sensor situated withinthe defined prohibited region within a structure associated with thecommercial environment to detect proximity of an item tag associatedwith an item configured with the proximity exclusion. As such, one ormore control points may be configured with the proximity exclusioncriteria. Alternatively, where the proximity exclusion criteria specifyone or more particular exclusionary control points, the respectiveexclusionary control points may be configured with the proximityexclusion criteria along with the item tag for the item that is excludedfrom the exclusionary control point. Proximity exclusions may beconfigured in association with one or more structures associated with acommercial environment, such as a store, a warehouse, a fenced-inmaterial storage yard, a structural container of cargo truck, a cab of acargo truck, a dressing room, and other forms of structures that may bewithin or associated with a commercial environment. The processing atblock 408 may also include configuring, in association with theproximity exclusion, a time-based proximity threshold that allows theitem to be located within the defined prohibited region for a specifiedperiod of time.

At block 410, the process 400 activates the tag(s), and records acurrent time and location of the respective item(s). Recording of timeand location of items may be performed, for example, by use of thetimer/clock module 218, and the GPS module 216, respectively. At block412, the process 400 begins movement tracking by monitoring changes inlocation of the proximity-excluded item(s). The process 400 may detectone or more movements of the item within the 3D structure of thecommercial environment. The detected movements of the item may includedetecting a vertical movement of the item and/or detecting a horizontalmovement of the item.

At decision point 414, the process 400 enters a higher-level iterativeloop that iteratively performs processing to determine detection ofproximity exclusions at decision point 414, completion of processing atblock 416, and receipt of additional requests to configure another tagwith a proximity exclusion at decision point 418. In response to anegative determination at any of these decision points 414, 416, and418, the process 400 iterates through the decision points 414, 416, and418 respectively until an affirmative determination is made. At decisionpoint 418, in response to determining that a request to configureanother tag with a proximity exclusion has been received, the process400 returns to block 404 and iterates as described above to configureand begin monitoring of the additional proximity exclusions.

Returning to decision point 414, in response to determining that aproximity exclusion has been detected, the process 400 makes adetermination at decision point 420 as to whether a time-based proximitythreshold (hysteresis) has been configured for the particular itemand/or proximity exclusion control point, as appropriate for theparticular detected proximity exclusion. The processing at decisionpoint 414 may include determining whether the item has entered ahorizontal keep-out region or a vertical keep-out region configured aspart of the proximity exclusion for the item. Further, the verticalkeep-out region may include one or more of a keep-out region above and akeep-out region below an acceptable vertical elevation range for theitem within a structure associated with the commercial environment.

In response to determining at decision point 420 that a time-basedproximity threshold has been configured for the item and/or proximityexclusion control point, the process 400 makes a determination atdecision point 422 as to whether the configured time-based proximitythreshold has expired.

In response to determining at decision point 422 that the configuredtime-based proximity threshold has not expired, the process 400 reentersthe higher-level iteration by returning to decision point 416 anditerates as described above. However, it should be noted that for anydetected event, a detected proximity exclusion may remain asserted toensure timely real-time processing of the detected proximity exclusion.Alternatively, as described above, the process 400 may be multi-threadedto enhance real-time performance and processing associated with detectedproximity exclusions. As such, if a request to configure another tag isdetected at decision point 418, a new thread may be initiated to performthe proximity exclusion configuration processing to allow prompt returnto real-time management of the previously-detected proximity exclusion.As noted above, the process 400 may alternatively be implemented as twoprocesses, as appropriate for the given implementation.

Returning to the description of decision points 420 and 422, in responseto determining that a time-based proximity threshold (hysteresis) hasnot been configured for the particular item and/or proximity exclusioncontrol point at decision point 420, or in response to determining thatthe configured time-based proximity threshold has expired at decisionpoint 422, the process 400 acquires camera images associated with at ornear a location at which the proximity exclusion was detected (e.g.,either an exclusionary control point or a location where twomutually-exclusive tags/items have been moved into relative proximity)at block 424. The images may be contemporaneous images captured duringthe entire movement monitoring of the item that is detected to haveviolated the proximity exclusion. As such, security personnel may beprovided with a time series of images (still or video) that document theitem's movement.

At block 426, the process 400 generates a proximity exclusion alert andprovides the captured images, as appropriate for the givenimplementation. As such, in association with generation of the proximityexclusion alert, the process 400 may provide image content of, near theboundary of, or at an entrance of the defined prohibited region (e.g.,outside the entrance to a dressing room) contemporaneously captured withdetecting the movement of the item within a structure of the commercialenvironment that is determined to result in the item being locatedwithin the defined prohibited region within the structure associatedwith the commercial environment. The proximity exclusion alert may becaused to be generated either by the item tag itself, or may be causedto be generated to security personnel, as appropriate for the givenimplementation. Tag generated proximity exclusion alerts may be usefulin situations, such as vertical proximity exclusions, where the detectedheight of a heavy object is causes an immediate alert of danger.Alternatively, generation of proximity exclusion alerts to securitypersonnel may be useful in situations, such as retail environments wherea proximity exclusion is detected in association with merchandise.Further, as described above, the proximity exclusion alert may begenerated in response to an item being located within the definedprohibited region for longer than the specified period of time within aconfigured time-based proximity threshold. Upon generating the proximityalert and providing the captured images at block 426, the process 400returns to decision point 416 and iterates as described above. Inresponse to determining at decision point 416 that processing iscompleted, the process 400 returns to decision point 402 and iterates asdescribed above.

As such, the process 400 provides technology for configuration ofproximity exclusion for items relative to exclusionary control points orrelative to other items. The process 400 also provides technology formonitoring configured proximity exclusions, and for generating proximityexclusion alerts in response to detection of a proximity exclusion. Theprocess 400 also implements time-based proximity exclusion thresholdsthat allow short-term deviations related to configured proximityexclusions.

As described above in association with FIG. 1 through FIG. 4, theexample systems and processes provide item movement tracking withthree-dimensional (3D) proximity exclusions. Many other variations andadditional activities associated with item movement tracking withthree-dimensional (3D) proximity exclusions are possible and all areconsidered within the scope of the present subject matter.

Those skilled in the art will recognize, upon consideration of the aboveteachings, that certain of the above examples are based upon use of aprogrammed processor, such as the CPU 202. However, the invention is notlimited to such example embodiments, since other embodiments could beimplemented using hardware component equivalents such as special purposehardware and/or dedicated processors. Similarly, general purposecomputers, microprocessor based computers, micro-controllers, opticalcomputers, analog computers, dedicated processors, application specificcircuits and/or dedicated hard wired logic may be used to constructalternative equivalent embodiments.

The present invention may be a system, a method, and/or a computerprogram product. The computer program product may include a computerreadable storage medium (or media) having computer readable programinstructions thereon for causing a processor to carry out aspects of thepresent invention.

The computer readable storage medium can be a tangible device that canretain and store instructions for use by an instruction executiondevice. The computer readable storage medium may be, for example, but isnot limited to, an electronic storage device, a magnetic storage device,an optical storage device, an electromagnetic storage device, asemiconductor storage device, or any suitable combination of theforegoing. A non-exhaustive list of more specific examples of thecomputer readable storage medium includes the following: a portablecomputer diskette, a hard disk, a random access memory (RAM), aread-only memory (ROM), an erasable programmable read-only memory (EPROMor Flash memory), a static random access memory (SRAM), a portablecompact disc read-only memory (CD-ROM), a digital versatile disk (DVD),a memory stick, a floppy disk, a mechanically encoded device such aspunch-cards or raised structures in a groove having instructionsrecorded thereon, and any suitable combination of the foregoing. Acomputer readable storage medium, as used herein, is not to be construedas being transitory signals per se, such as radio waves or other freelypropagating electromagnetic waves, electromagnetic waves propagatingthrough a waveguide or other transmission media (e.g., light pulsespassing through a fiber-optic cable), or electrical signals transmittedthrough a wire.

Computer readable program instructions described herein can bedownloaded to respective computing/processing devices from a computerreadable storage medium or to an external computer or external storagedevice via a network, for example, the Internet, a local area network, awide area network and/or a wireless network. The network may comprisecopper transmission cables, optical transmission fibers, wirelesstransmission, routers, firewalls, switches, gateway computers and/oredge servers. A network adapter card or network interface in eachcomputing/processing device receives computer readable programinstructions from the network and forwards the computer readable programinstructions for storage in a computer readable storage medium withinthe respective computing/processing device.

Computer readable program instructions for carrying out operations ofthe present invention may be assembler instructions,instruction-set-architecture (ISA) instructions, machine instructions,machine dependent instructions, microcode, firmware instructions,state-setting data, or either source code or object code written in anycombination of one or more programming languages, including an objectoriented programming language such as Smalltalk, C++ or the like, andconventional procedural programming languages, such as the “C”programming language or similar programming languages. The computerreadable program instructions may execute entirely on the user'scomputer, partly on the user's computer, as a stand-alone softwarepackage, partly on the user's computer and partly on a remote computeror entirely on the remote computer or server. In the latter scenario,the remote computer may be connected to the user's computer through anytype of network, including a local area network (LAN) or a wide areanetwork (WAN), or the connection may be made to an external computer(for example, through the Internet using an Internet Service Provider).In some embodiments, electronic circuitry including, for example,programmable logic circuitry, field-programmable gate arrays (FPGA), orprogrammable logic arrays (PLA) may execute the computer readableprogram instructions by utilizing state information of the computerreadable program instructions to personalize the electronic circuitry,in order to perform aspects of the present invention.

Aspects of the present invention are described herein with reference toflowchart illustrations and/or block diagrams of methods, apparatus(systems), and computer program products according to embodiments of theinvention. It will be understood that each block of the flowchartillustrations and/or block diagrams, and combinations of blocks in theflowchart illustrations and/or block diagrams, can be implemented bycomputer readable program instructions.

These computer readable program instructions may be provided to aprocessor of a general purpose computer, special purpose computer, orother programmable data processing apparatus to produce a machine, suchthat the instructions, which execute via the processor of the computeror other programmable data processing apparatus, create means forimplementing the functions/acts specified in the flowchart and/or blockdiagram block or blocks. These computer readable program instructionsmay also be stored in a computer readable storage medium that can directa computer, a programmable data processing apparatus, and/or otherdevices to function in a particular manner, such that the computerreadable storage medium having instructions stored therein comprises anarticle of manufacture including instructions which implement aspects ofthe function/act specified in the flowchart and/or block diagram blockor blocks.

The computer readable program instructions may also be loaded onto acomputer, other programmable data processing apparatus, or other deviceto cause a series of operational steps to be performed on the computer,other programmable apparatus or other device to produce a computerimplemented process, such that the instructions which execute on thecomputer, other programmable apparatus, or other device implement thefunctions/acts specified in the flowchart and/or block diagram block orblocks.

The flowchart and block diagrams in the Figures illustrate thearchitecture, functionality, and operation of possible implementationsof systems, methods, and computer program products according to variousembodiments of the present invention. In this regard, each block in theflowchart or block diagrams may represent a module, segment, or portionof instructions, which comprises one or more executable instructions forimplementing the specified logical function(s). In some alternativeimplementations, the functions noted in the block may occur out of theorder noted in the figures. For example, two blocks shown in successionmay, in fact, be executed substantially concurrently, or the blocks maysometimes be executed in the reverse order, depending upon thefunctionality involved. It will also be noted that each block of theblock diagrams and/or flowchart illustration, and combinations of blocksin the block diagrams and/or flowchart illustration, can be implementedby special purpose hardware-based systems that perform the specifiedfunctions or acts or carry out combinations of special purpose hardwareand computer instructions.

The terminology used herein is for the purpose of describing particularembodiments only and is not intended to be limiting of the invention. Asused herein, the singular forms “a,” “an” and “the” are intended toinclude the plural forms as well, unless the context clearly indicatesotherwise. It will be further understood that the terms “comprises”and/or “comprising,” when used in this specification, specify thepresence of stated features, integers, steps, operations, elements,and/or components, but do not preclude the presence or addition of oneor more other features, integers, steps, operations, elements,components, and/or groups thereof.

The corresponding structures, materials, acts, and equivalents of allmeans or step plus function elements in the claims below are intended toinclude any structure, material, or act for performing the function incombination with other claimed elements as specifically claimed. Thedescription of the present invention has been presented for purposes ofillustration and description, but is not intended to be exhaustive orlimited to the invention in the form disclosed. Many modifications andvariations will be apparent to those of ordinary skill in the art basedupon the teachings herein without departing from the scope and spirit ofthe invention. The subject matter was described to explain theprinciples of the invention and the practical application, and to enableothers of ordinary skill in the art to understand the invention forvarious embodiments with various modifications as are suited to theparticular use contemplated.

What is claimed is:
 1. A computer-implemented method, comprising:programmatically monitoring, by iteratively querying an item tag of anitem for measured vertical and horizontal coordinates of the item tag,changes of a vertical and horizontal position of the item relative to atleast one three-dimensional (3D) item-specific proximity exclusionattribute that precludes movement of the item into a defined 3Ditem-configured prohibited region; and generating, in response todetermining that a detected change of at least one of the vertical andhorizontal position of the item results in the item being located withinthe defined 3D item-configured prohibited region, an item-specificproximity exclusion alert indicating that the item is located within thedefined 3D item-configured prohibited region.
 2. Thecomputer-implemented method of claim 1, further comprising: configuringa commercial environment tag sensor located within the defined 3Ditem-configured prohibited region with the at least one 3D item-specificproximity exclusion attribute of the item tag, where the commercialenvironment tag sensor detects proximity of the item tag configured withthe at least one 3D item-specific proximity exclusion attribute.
 3. Thecomputer-implemented method of claim 1, where the defined 3Ditem-configured prohibited region comprises a vertical item-specifickeep-out region, and further comprising: detecting a vertical movementof the item that results in a vertical change of position of the item;and where determining that the detected change of the at least one ofthe vertical and horizontal position of the item results in the itembeing located within the defined 3D item-configured prohibited regioncomprises: determining that the item has entered the verticalitem-specific keep-out region.
 4. The computer-implemented method ofclaim 3, where the vertical item-specific keep-out region comprises atleast one of an item-specific keep-out region above and an item-specifickeep-out region below an acceptable vertical elevation range for theitem in a commercial environment, where the acceptable verticalelevation range defines a 3D region within a single floor elevation ofan area of the commercial environment.
 5. The computer-implementedmethod of claim 1, further comprising: configuring, in association withthe 3D item-specific proximity exclusion, a time-based item-specificproximity hysteresis threshold that allows the item to be locatedtemporarily within the defined 3D item-configured prohibited region fora specified period of time without generating the item-specificproximity exclusion alert; and where generating, in response todetermining that the detected change of the at least one of the verticaland horizontal position of the item results in the item being locatedwithin the defined 3D item-configured prohibited region, theitem-specific proximity exclusion alert indicating that the item islocated within the defined 3D item-configured prohibited regioncomprises: generating the item-specific proximity exclusion alert inresponse to the item being located within the defined 3D item-configuredprohibited region for a longer period of time than the specified periodof time of the configured time-based item-specific proximity hysteresisthreshold.
 6. The computer-implemented method of claim 1, furthercomprising: providing the item-specific proximity exclusion alert on aconsole within in a security management office along with a time seriesof security camera images that document detected changes of vertical andhorizontal position of the item within a 3D grid of a commercialenvironment during times prior to the generation of the item-specificproximity exclusion alert; and providing image content of at least anentrance to the defined 3D item-configured prohibited regioncontemporaneously captured with the detected change of the at least oneof the vertical and horizontal position of the item that resulted in theitem being located within the defined 3D item-configured prohibitedregion.
 7. The computer-implemented method of claim 1, where the atleast one 3D item-specific proximity exclusion attribute is configuredwith an item identifier (ID) of the item to facilitate the programmaticmonitoring of the changes of the vertical and horizontal position of theitem independently of movements of other items.
 8. A system, comprising:a communication module; and a processor programmed to: programmaticallymonitor, by iteratively querying an item tag of an item for measuredvertical and horizontal coordinates of the item tag using thecommunication module, changes of a vertical and horizontal position ofthe item relative to at least one three-dimensional (3D) item-specificproximity exclusion attribute that precludes movement of the item into adefined 3D item-configured prohibited region; and generate, in responseto determining that a detected change of at least one of the verticaland horizontal position of the item results in the item being locatedwithin the defined 3D item-configured prohibited region, anitem-specific proximity exclusion alert indicating that the item islocated within the defined 3D item-configured prohibited region.
 9. Thesystem of claim 8, where the processor is further programmed to:configure a commercial environment tag sensor located within the defined3D item-configured prohibited region with the at least one 3Ditem-specific proximity exclusion attribute of the item tag, where thecommercial environment tag sensor detects proximity of the item tagconfigured with the at least one 3D item-specific proximity exclusionattribute.
 10. The system of claim 8, where the defined 3Ditem-configured prohibited region comprises a vertical item-specifickeep-out region, the vertical item-specific keep-out region comprisingat least one of an item-specific keep-out region above and anitem-specific keep-out region below an acceptable vertical elevationrange for the item in a commercial environment, where the acceptablevertical elevation range defines a 3D region within a single floorelevation of an area of the commercial environment, and where theprocessor is further programmed to: detect a vertical movement of theitem that results in a vertical change of position of the item; andwhere, in being programmed to determine that the detected change of theat least one of the vertical and horizontal position of the item resultsin the item being located within the defined 3D item-configuredprohibited region, the processor is programmed to: determine that theitem has entered the vertical item-specific keep-out region.
 11. Thesystem of claim 8, where the processor is further programmed to:configure, in association with the 3D item-specific proximity exclusion,a time-based item-specific proximity hysteresis threshold that allowsthe item to be located temporarily within the defined 3D item-configuredprohibited region for a specified period of time without generating theitem-specific proximity exclusion alert; and where, in being programmedto generate, in response to determining that the detected change of theat least one of the vertical and horizontal position of the item resultsin the item being located within the defined 3D item-configuredprohibited region, the item-specific proximity exclusion alertindicating that the item is located within the defined 3Ditem-configured prohibited region, the processor is programmed to:generate the item-specific proximity exclusion alert in response to theitem being located within the defined 3D item-configured prohibitedregion for a longer period of time than the specified period of time ofthe configured time-based item-specific proximity hysteresis threshold.12. The system of claim 8, where the processor is further programmed to:provide the item-specific proximity exclusion alert on a console withinin a security management office along with a time series of securitycamera images that document detected changes of vertical and horizontalposition of the item within a 3D grid of a commercial environment duringtimes prior to the generation of the item-specific proximity exclusionalert; and provide image content of at least an entrance to the defined3D item-configured prohibited region contemporaneously captured with thedetected change of the at least one of the vertical and horizontalposition of the item that resulted in the item being located within thedefined 3D item-configured prohibited region.
 13. The system of claim 8,where the at least one 3D item-specific proximity exclusion attribute isconfigured with an item identifier (ID) of the item to facilitate theprogrammatic monitoring of the changes of the vertical and horizontalposition of the item independently of movements of other items.
 14. Acomputer program product, comprising: a computer readable storage mediumhaving computer readable program code embodied therewith, where thecomputer readable storage medium is not a transitory signal per se andwhere the computer readable program code when executed on a computercauses the computer to: programmatically monitor, by iterativelyquerying an item tag of an item for measured vertical and horizontalcoordinates of the item tag, changes of a vertical and horizontalposition of the item relative to at least one three-dimensional (3D)item-specific proximity exclusion attribute that precludes movement ofthe item into a defined 3D item-configured prohibited region; andgenerate, in response to determining that a detected change of at leastone of the vertical and horizontal position of the item results in theitem being located within the defined 3D item-configured prohibitedregion, an item-specific proximity exclusion alert indicating that theitem is located within the defined 3D item-configured prohibited region.15. The computer program product of claim 14, where the computerreadable program code when executed on the computer further causes thecomputer to: configure a commercial environment tag sensor locatedwithin the defined 3D item-configured prohibited region with the atleast one 3D item-specific proximity exclusion attribute of the itemtag, where the commercial environment tag sensor detects proximity ofthe item tag configured with the at least one 3D item-specific proximityexclusion attribute.
 16. The computer program product of claim 14, wherethe defined 3D item-configured prohibited region comprises a verticalitem-specific keep-out region, and where the computer readable programcode when executed on the computer further causes the computer to:detect a vertical movement of the item that results in a vertical changeof position of the item; and where, in causing the computer to determinethat the detected change of the at least one of the vertical andhorizontal position of the item results in the item being located withinthe defined 3D item-configured prohibited region, the computer readableprogram code when executed on the computer causes the computer to:determine that the item has entered the vertical item-specific keep-outregion.
 17. The computer program product of claim 16, where the verticalitem-specific keep-out region comprises at least one of an item-specifickeep-out region above and an item-specific keep-out region below anacceptable vertical elevation range for the item in a commercialenvironment, where the acceptable vertical elevation range defines a 3Dregion within a single floor elevation of an area of the commercialenvironment.
 18. The computer program product of claim 14, where thecomputer readable program code when executed on the computer furthercauses the computer to: configure, in association with the 3Ditem-specific proximity exclusion, a time-based item-specific proximityhysteresis threshold that allows the item to be located temporarilywithin the defined 3D item-configured prohibited region for a specifiedperiod of time without generating the item-specific proximity exclusionalert; and where, in causing the computer to generate, in response todetermining that the detected change of the at least one of the verticaland horizontal position of the item results in the item being locatedwithin the defined 3D item-configured prohibited region, theitem-specific proximity exclusion alert indicating that the item islocated within the defined 3D item-configured prohibited region, thecomputer readable program code when executed on the computer causes thecomputer to: generate the item-specific proximity exclusion alert inresponse to the item being located within the defined 3D item-configuredprohibited region for a longer period of time than the specified periodof time of the configured time-based item-specific proximity hysteresisthreshold.
 19. The computer program product of claim 14, where thecomputer readable program code when executed on the computer furthercauses the computer to: provide the item-specific proximity exclusionalert on a console within in a security management office along with atime series of security camera images that document detected changes ofvertical and horizontal position of the item within a 3D grid of acommercial environment during times prior to the generation of theitem-specific proximity exclusion alert; and provide image content of atleast an entrance to the defined 3D item-configured prohibited regioncontemporaneously captured with the detected change of the at least oneof the vertical and horizontal position of the item that resulted in theitem being located within the defined 3D item-configured prohibitedregion.
 20. The computer program product of claim 14, where the at leastone 3D item-specific proximity exclusion attribute is configured with anitem identifier (ID) of the item to facilitate the programmaticmonitoring of the changes of the vertical and horizontal position of theitem independently of movements of other items.