专利摘要:
The invention relates to a type of anti-theft device comprising an electronic burglar-proof device. Such a device also comprises: a deactivating member of the electronic antitheft device; energy supply means, at least indirectly supplying said deactivation member of the anti-theft electronic device; means for receiving a deactivation command of the electronic antitheft device.
公开号:FR3034559A1
申请号:FR1552762
申请日:2015-03-31
公开日:2016-10-07
发明作者:Eric Brier;Pierre Martinez
申请人:Compagnie Industrielle et Financiere dIngenierie Ingenico SA;
IPC主号:
专利说明:

[0001] BACKGROUND OF THE INVENTION The present invention relates to an anti-theft device, particularly shoplifting, for protecting over-the-counter items. -service in a commercial retail establishment, such as articles of clothing, shoes, leather goods. 2. PRIOR ART The anti-theft devices known for these items for sale are generally of the macaron type comprising two parts, a part attached after the article to be protected and is in the form of nail stitched in the article and therethrough, and another portion hosting the tip of the nail, and housing the anti-theft electronic system and a locking system adapted to retain the tip of the nail. The document FR2395553 for example describes such a device. The article to be protected is thus traversed by a nail and pinched against the opposite part of the device holding said nail. This same part comprises an electronic antitheft device such as a resonant electrical circuit capable of responding to the presence of a magnetic field, a radio frequency field or an interrogating electromagnetic field of an external detection system. When the article provided with the antitheft device passes through a control or interrogation zone, the electronic device of the antitheft device co-operates with the detection system put in place, causing the triggering of an alarm signal at the resonance frequency. of the electrical circuit of the device. The removal of the antitheft device from the article is performed by means of a support tool and magnet, on which is applied the part of the device provided with the locking system of the nail. Other antitheft devices, based on similar principles, exist: they differ from that described above for example by the shape of the device or by the use or not of a flexible cable in place of the nail. More recently, contactless labels and RF tags have also been used as anti-theft devices. Such labels are either directly integrated into the article (for example, garment labels sewn inside the garment) or stuck on the article (these are labels including a self-adhesive part) .
[0002] These devices are considered effective in limiting theft. However, they have a major disadvantage: they require to be disabled by a particular device during the passage of the item in cash. More particularly, for mechanical locks in two 3034559 2 parts such as that presented in FR2395553, it is necessary to disassemble the antitheft after paying cash purchases. For tag type locks, it is necessary to subject them to a magnetic field more or less intense causing their deactivation. This is not without problems, for example during periods of high traffic in the stores (periods of sales or promotions). The fact of having to disassemble or deactivate the antitheft device increases to a greater or lesser extent the time required for customers to cash out. This can lead to long waiting periods at the checkouts. However, many customers are not necessarily willing to wait at the checkout and prefer to give up the purchase rather than wait. This results in a loss of turnover more or less significant for the trader. 3. Summary The proposed technique does not have these disadvantages of the prior art. More particularly, the proposed technique facilitates the act of purchase while avoiding theft. The proposed technique relates more particularly to a theft protection device 15 comprising a payment and / or automatic deblocking feature when a payment is made. Thus, the potential buyer can make a purchase without having to wait to release the theft protection device. When the purchase is made (either through the theft protection device itself or by another intermediary), the theft protection device is unlocked, thereby allowing the user to remove it. the item he bought and leave the point of sale without waiting. With the theft protection device of the invention, the point of sale or the merchant can avoid a loss of turnover during peak periods and increase customer satisfaction. According to a particular embodiment, the anti-theft protection device is of the type comprising an electronic anti-theft device device; it also comprises: a deactivating member of the electronic anti-theft device; power supply means, at least indirectly supplying said deactivating member of the electronic burglarproof device; means for receiving a deactivation command of the electronic antitheft device. Thus, such a device makes it possible to make a purchase without necessarily having to transit through a cash register or a payment terminal. Such a device thus makes it possible to facilitate the act of purchase and by the same to solve at least two problems such as waiting times at the checkouts and the loss of turnover due to such waiting times. at the checkouts. According to a particular embodiment, it comprises a contactless communication module.
[0003] Thus, such a device makes it possible to make a purchase using any type of contactless payment method, such as for example a contactless bank card or a mobile payment terminal without contact. According to a particular embodiment, it further comprises: a processor for managing at least one operating mode of the theft protection device; a storage memory of relevant data. According to a particular embodiment, the processor manages at least two modes of operation comprising: a configuration mode in which the device is able to receive relevant data in the storage memory; a mode of protection. According to a particular embodiment, the protection mode comprises a sub-payment mode in which the device carries out at least part of a payment transaction from a payment means.
[0004] According to a particular embodiment, the protection mode comprises a deblocking mode in which the device controls the deactivating member of the electronic anti-theft device, using the processor. According to a particular embodiment, the unlocking mode is activated in at least two different ways: upon receipt of a release command from the processor of the device, this unlocking command resulting from a payment made at least in part, using the processor; upon receipt of an unblocking command from the device processor, this unblocking command resulting from a payment made by a management system 30 of a point of sale within which the protection device is positioned; According to a particular embodiment, the protection mode mode comprises a permanent blocking mode, wherein said device cancels an attempt to implement another sub mode of operation. Thus, such a device makes it possible to avoid a flight for example as a result of a loss of autonomy (low battery) or for example under conditions of significant electromagnetic interference. According to a particular embodiment, it further comprises means for displaying at least one useful datum intended for a consumer. Thus, such a device makes it possible to ensure that the user (the consumer) can read the information useful for the purchase of the product, such as the price, the size, the weight, etc. According to a particular embodiment, the device according to claim 1 is integrated within a basket. Thus, the anti-theft protection device comprises at least two modes of operation: a so-called configuration operating mode, in which the anti-theft protection device can receive useful data and / or necessary for its payment function and / or release and a protection mode in which the theft protection device is associated with an article and is able to unlock on receipt of either an unlock command from a payment system of the point of sale of one or more valid credit card identifiers (when the device incorporates a payment function). In this configuration mode, which can be active by default as soon as the device is no longer associated with an article (ie for example when the locking nail is removed or when the device is separated from another type of locking means ), the protection mode is implemented when the locking nail is associated with the anti-theft device. In the configuration mode, a complementary actuator can be used, for example, for the anti-theft protection device to go into a so-called data reception mode. In this mode, the device is able to receive data, for example configuration data relating to the price to be paid or configuration data relating to the type of article or the size thereof. Thus, such an actuator prevents the device from being waiting for configuration data as soon as it has been deactivated: this makes it possible to prolong the life of the battery and to avoid having to recharge the device too much. common.
[0005] The device comprises at least one power management module configured to deactivate the deblocking and / or payment functions when the level of the power supply decreases below a predetermined threshold. Thus, when the battery of the device goes down to a given threshold, the theft protection device goes into a mode of inactivity. This inactivity mode requires a checkout and a manual unlock. Thus, even when the power supply becomes insufficient, the protective device continues to provide the protection function that it usually performs. Said device comprises a contactless communication module for reading data, said contactless communication module for reading data being configured to obtain data relating to the article on which it is placed. The contactless communication module for reading data implements, for reading the data, the existing detection antenna of the detection device. Thus, it is possible to automatically (or semi automatically) configure the flight protection device by retrieving, directly on the article on which it is installed, relevant data, such as for example price data or data. the size of the garment or other such data that may be present in an existing contactless tag on the article on which the device is installed. Therefore, the installation and configuration of the protection device against theft is facilitated.
[0006] Thus, it is not necessary to have an additional antenna in order to obtain data on the product on which the device is installed. The protection device includes a display module configured to display relevant data for a user. Such a display module can be used for, for example, driving a low consumption liquid crystal display. This screen can then display useful data for the user or the consumer such as the price of the article, its size, or any other data of interest for the purpose of purchase. The screen can also be used to display configuration data and / or battery data. The relevant data are for example obtained from the contactless communication module when the protective device is placed on the article to be protected and that for example the actuator 30 is actuated so that the device can read the data from the device. contactless label already present on the item to be protected. Relevant data may also be transmitted from another wireless interface, eg Zigbee, from the point of sale management system. The protection device, in configuration mode, may for example, in a particular embodiment, implement the method comprising the following steps: detection of the configuration mode switch; reading, using the contactless communication module, identification data of the article to be protected; transmitting, using a wireless transmission interface (e.g., zigbee, bluetooth LE), said identification data to a management device; Receiving, from said management device, at least one relevant piece of data. When a screen is available on the protection device, a display of at least one useful data item is performed as a function of the said at least one relevant piece of data received. The protective device, in protection mode, may for example, in a particular embodiment, implement the method comprising the following steps: receiving an unlocking command; implementation of the unlocking means. These two steps can advantageously be completed by the prior steps of: receiving an identification data of a contactless payment means using the contactless communication interface of the protection device; Transmitting, to a device located on a communication network, a datum representative of a price to be paid and the identification data of the means of payment; implementing a payment transaction using the previously transmitted data; Subsequent to the implementation of the unlocking means, display for example on the display means of the protection device, information to validate the payment. The steps of receiving identification data, data transmission and payment implementations can be performed on the protection device itself or by other devices connected to each other via a network. of communications.
[0007] According to a preferred implementation, the various steps of the methods according to the proposed technique are implemented by one or more software or computer programs, comprising software instructions intended to be executed by a data processor of a relay module. according to the proposed technique and being designed to control the execution of the different steps of the processes. Accordingly, the proposed technique is directed to a program that can be executed by a computer or a data processor, which program includes instructions for controlling the execution of the steps of a method as mentioned above. This program can use any programming language, and be in the form of source code, object code, or intermediate code between source code and object code, such as in a partially compiled form, or in any other form desirable shape. The proposed technique is also directed to a data processor readable medium, and including instructions of a program as mentioned above. The information carrier may be any entity or device capable of storing the program. For example, the medium may comprise storage means, such as a ROM, for example a CD ROM or a microelectronic circuit ROM, or a magnetic recording medium, for example a diskette (floppy disc) or a disk hard.
[0008] On the other hand, the information medium may be a transmissible medium such as an electrical or optical signal, which may be conveyed via an electrical or optical cable, by radio or by other means. The program according to the proposed technique can be downloaded in particular on an Internet type network. Alternatively, the information carrier may be an integrated circuit in which the program is incorporated, the circuit being adapted to execute or to be used in the execution of the method in question. According to one embodiment, the proposed technique is implemented by means of software and / or hardware components. In this context, the term "module" may correspond in this document to a software component, to a hardware component or to a set of hardware and software components. A software component corresponds to one or more computer programs, one or more subroutines of a program, or more generally to any organ of a program or software capable of implementing a function or a program. set of functions, as described below for the module concerned. Such a software component is executed by a data processor of a physical entity (terminal, server, gateway, router, etc.) and is capable of accessing the hardware resources of that physical entity (memories, media). recording, communication bus, I / O boards, user interfaces, etc.). In the same way, a hardware component corresponds to any element of a hardware set (or hardware) able to implement a function or a set of functions, as described below for the module concerned. It may be a hardware component that is programmable or has an integrated processor for executing software, for example an integrated circuit, a smart card, a memory card, an electronic card for executing a firmware ( firmware), etc. Each component of the previously described system naturally implements its own software modules. The various embodiments mentioned above are combinable with each other for the implementation of the proposed technique. 4. Figures Other features and advantages of the proposed technique will become more apparent upon reading the following description of two embodiments, given by way of a simple illustrative and nonlimiting example, and the appended drawings, among which: Figure la illustrates a first embodiment; FIG. 1b also illustrates the embodiment of FIG. 1; 5. Description 20 5.1. Reminders In search of a solution that both protects against theft, self-service items and to facilitate the act of purchase, the inventors have had the idea to integrate functions payment and / or unblocking, in a protective device against theft. Several embodiments are possible. Two main embodiments are described later. A general principle can, however, be found. More particularly, it is a question of conditioning the deactivation of the anti-theft function to the implementation of a deactivation command (command following the implementation of a payment for example). The anti-theft device (also called theft protection device or protection device) 30 is thus an intelligent device that is able for example to conduct itself a payment transaction and / or for example to receive from a payment device a deactivation command. Thus, the antitheft device has a capacity of autonomous deactivation, capacity materialized by the use of a deactivating member, energy supply means (electrical for example) and means for receiving a control of deactivation of the electronic anti-theft device. In addition, in addition to continuing to protect self-service items, the protection device becomes a sales support device. As explained later, the protective device may have a screen, for example a low-power liquid crystal display, which screen may be used to display information useful for the customer, such as information on the price or size of the item (s) that will be purchased. In general, the protection device comprises, as usual, an electronic anti-theft device, taking for example the shape of a copper coil or an antenna. When the device passes a detection barrier, it causes a distortion of the signal (magnetic, electromagnetic, radiofrequency) emitted by the protective barrier and causes the triggering of an alarm. The protection device further comprises a processor such as a secure processor. Such a processor may for example be embedded in a security module (for example of the printed circuit board, Javacard) directly molded into the body of the protection device (just like the electronic antitheft device). This processor has access to a memory, this memory being used to record relevant data. These data are for example the price of the item or items, the size, the weight, the number of times or the device has been activated and deactivated. The relevant data can also be encryption keys, addresses (addresses of wireless communication modules such as bluethooth LE, Zigbee, etc.). Some of these relevant data are implemented during the manufacturing phase of the protection device, others are received in a configuration phase. The device also comprises a battery (whether rechargeable or not) providing a sufficient supply of energy to process the data transmitted and received and providing a sufficient supply of energy to implement a possible deblocking module (when this deblocking module is present). The device also comprises, in at least one embodiment, a contactless communication module (for example of the NEC type) making it possible to receive, from a payment means (for example a contactless bank card or a communication terminal). having a communication module without contact), the data necessary for the implementation of a payment (card number, name of the carrier, etc.).
[0009] The protection device comprises two distinct modes of operation: a configuration mode in which the device receives relevant data for its activation. In this mode, the device is not yet usable to make a payment or to perform a deblocking. The device also comprises a protection mode in which it implements, according to its hardware and software configuration, one or more of the following sub modes: a sub payment mode in which the device is able to perform at least one part of a payment transaction from a means of payment (such as a contactless payment method); A deblocking mode in which the device is able to unlock a gripping means (such as a nail, a locking spring, etc.) which exerts an action on the locking member, so that the device can be removed by a user (eg a consumer or merchant); this unlocking mode can be activated in two different ways, depending on the situation and the hardware and software configuration of the protection device: by receiving an unlock command from the device processor, this unlocking command following a payment realized at least in part, using the processor; by receiving a release command from the device processor, this deblocking command following a payment made by the point-of-sale management or marketing system; a permanent locking mode, in which the protection device behaves like a conventional lock. Such a mode is implemented when the protection device is no longer able to correctly fulfill its payment and / or unblocking functions, for example following a loss of autonomy (low battery) or for example in conditions of significant electromagnetic disturbances. In the configuration mode, the protection device is able to receive relevant data. It receives this information either from a wireless transmission system (Zigbee, bluetooth) or without contact (NEC). The following method is implemented: detection of the passage in configuration mode; this detection can be done for example by using an actuator (such as a physical or software switch); obtaining relevant data.
[0010] The obtaining of the relevant data can be implemented in at least two different ways. A first method comprises: reading, using the contactless communication module of the protection device, an identification data of the article to be protected (data contained for example in a contactless label already present on the article to be protected); transmission, using a wireless transmission interface (eg zigbee, bluetooth, bluetooth LE), from said identification data to a management device; receiving, from said management device, at least one relevant piece of data. When a screen is available on the protection device, display of at least one useful data item according to said at least one relevant data item received. A second method comprises receiving, from a configuration device (mobile terminal type or laptop), the aforementioned relevant data and the recording of these data in the memory of the antitheft device. In general, the following methods are implemented. The protection device, in configuration mode, may for example, in a particular embodiment, implement the method comprising the following steps: detection of the configuration mode switch; reading, using the contactless communication module, identification data of the article to be protected; Transmitting, using a wireless transmission interface (e.g., zigbee, bluetooth LE), said identification data to a management device; receiving, from said management device, at least one relevant piece of data. When a screen is available on the protection device, a display of at least one useful data item is performed as a function of the said at least one relevant piece of data received.
[0011] The protection device, in protection mode, can for example, in a particular embodiment, implement the method comprising the following steps: reception of an unlock command; - Implementation of the unlocking means. These two steps can advantageously be completed by the prior steps of: receiving an identification data of a non-contact payment means using the contactless communication interface of the protection device; 3034559 12 transmission, to a device located on a communication network, a data representative of a price to pay and the identification data of the means of payment; implementing a payment transaction using the previously transmitted data; Subsequently, two different embodiments of the protection device are described. 5.2. Descriptions of a first embodiment In this first embodiment, described with reference to FIGS. 1a and 1b, the technique is embodied in the form of an antitheft device (10) of generally rectangular parallelepipedal shape and of elongate shape, and having on one of its ends, an orifice (11) and or a prominence (12) for receiving the tip of a nail (13). This protrusion (12), when it exists comprises for example a nail retention system (14) which is pressed into the orifice (11). When the prominence does not exist (for example due to the general thickness of the product), the nail retention system (14) is integrated inside the lock (10). The shape of the antitheft does not matter and the previous examples are only indicative. In addition to the nail retention system, the lock also conventionally comprises a coil (15), for example of copper wire, said coil being used to cause a disturbance in a magnetic field (or electric, or radio frequency or electromagnetic, etc. .) when the anti-theft passes through detection gantries. This type of system is used, with variants, for many years to detect the passage of the lock 20 and trigger a siren and / or a light display. In this embodiment, the antitheft device further comprises a set of means for making a payment. More particularly, the antitheft device comprises autonomous unlocking means. These autonomous deblocking means comprise for example a source of electrical energy (PO) (such as a rechargeable battery) and an actuator (P00) (for example an electric motor). The actuator (P00) is able, for example, to mechanically modify the state of a nail holding claw (when this system is used). The actuator is powered by the source of electrical energy (PO). It is able to unlock the lock. To do this, the actuator receives a release command, which command can be transmitted in at least two different ways: in a first variant, the unlocking command is transmitted via a processor (P1), which is itself integrated in the antitheft, this processor is also in charge of performing a payment transaction; in this variant, the lock 3034559 13 is (at least partially) autonomous for the realization of the payment transaction; in a second variant, the unlocking command is also transmitted via a processor (P1), which is also integrated in the antitheft device; on the other hand, this processor is not in charge of carrying out the payment transaction. It merely receives orders from a central system, such as a point-of-sale payment and payment system; the anti-theft processor then acts as a relay between the point-of-sale payment and payment system and the user's means of payment.
[0012] The processor (P1) draws its power from a complementary power source (not shown) or the device battery (PO). Thus depending on the variants, either the lock can be directly used to make a payment, or it can be used to implement an unlock. The implementation of the payment, in the first variant, comprises the use, by the antitheft device, of a contactless communication interface (ICSC), which interface makes it possible to read data coming from a means of payment without contact (for example a credit card or a mobile terminal). This is for example an NEC interface. Note also that to prevent this interface consumes the battery of the antitheft too excessively, the antitheft also has a means of activation of the interface, this means 20 not being implemented only under special conditions. When this means is activated, the contactless communication interface (ICSC) in the antitheft device is activated and it can read data from a contactless payment means. In a simple embodiment, this activation means of the contactless communication interface (ICSC) is in the form of a push button (not shown), located for example next to the price of the article.
[0013] When this button is pressed, the contactless communication interface is activated for a predetermined period of time (for example a few seconds or tens of seconds). During this period, contactless data can be received. In another embodiment, the means is in the form of a proximity sensor, capable for example of detecting with an appropriate sensor, by an impedance variation (or a variation of resistance) the presence of a hand having seized the lock. When the contactless communication interface (ICSC) is activated, a contactless payment transaction can be implemented according to the usual standards in the field (for example ISO 14443), which are not the subject of the application. patent). When the antitheft device receives confirmation of the good progress of the transaction (for example from a bank server and / or from an intermediary processing server of the merchant) then the actuator (P00) of the Antitheft is implemented (to release the grip on the nail) by the processor (P1) and the user can separate the nail and the lock. The user gets rid of the lock by depositing it in a container provided for this purpose near the outlet of the store (for example near the flight detection porticoes) and can leave the store with the article he just settled. The implementation of the payment, in the second variant, is somewhat different.
[0014] A contactless communication interface (ICSC) is always used. However, this contactless communication interface is inserted in a contactless payment terminal, itself located for example near the exit of the store (for example near the flight detection porticos) or at the level of traditional crates. The contactless payment transaction is conducted from the contactless payment terminal 15 according to the usual standards in the field. When the contactless payment terminal receives confirmation of the successful completion of the transaction (for example from a bank server and / or from a transaction processing server of the merchant) then the contactless payment terminal transmits , at the lock, a release command, command processed by the processor (P1) of the antitheft device and generating the implementation of the actuator (P00) to release the nail. The user gets rid of the lock by depositing it in a container provided for this purpose near the outlet of the store (for example near the flight detection porticoes) and can leave the store with the article he just settled. Incidentally, the antitheft also includes a screen (SCR), for example a liquid crystal display, making it possible to display various information in relation to the article to which the antitheft device is attached. The screen (SCR) is connected, via a display bus, to a not shown processor (which may be identical to the processor P1 responsible for performing the payment and / or unblocking function) . The processor is itself connected to a memory (not shown), memory that includes the information to display. In addition, in at least one embodiment, the transmission of data between the antitheft device 30 and the devices capable of communicating with it (for example payment cards, communication terminals, payment terminals, etc.), is performed via an antenna formed by the copper coil for detecting theft. Thus, it avoids having to insert in the antitheft an additional antenna. In addition, in at least one embodiment, the lock can obtain, from an RFID tag, additional data. In addition, in at least one embodiment, the anti-theft device can erase or reset the contents of an RFID tag. Indeed, as stated previously, a significant amount of products (such as clothing products) are manufactured by directly integrating an RFID tag. This RFID tag can advantageously be used for storing product information (such as for example a barcode, or the encrypted equivalent of a bar code) and / or for acting as an antitheft device. Thus, in one embodiment, the antitheft device automatically retrieves data from an RFID tag already present on the product. This solves at least two additional problems. The first is in the configuration of the lock when it includes a screen indicating the price of the item. From the RFID tag, the lock obtains an identifier (for example a barcode). The identifier is transmitted by the lock to a central system (eg the central point of sale management system), which responds to the lock by transmitting the price to display. These steps are implemented once per product, when the lock is attached to the product. Obtaining data from the central point of sale system can be implemented via a low power protocol (eg Zigbee) in order to extend the battery life as much as possible. In addition, the fact that the antitheft device can erase or reset the contents of an RFID tag makes it possible to deactivate it when the customer has made his payment. Specifically, the lock emits, still through its coil, a magnetic field sufficient to erase the data on the label and make it inoperative.
[0015] In a variant, the device is in the form of a box or a bag containing one or more articles inserted by the merchant himself, prior to the provision of the customers. This embodiment is well suited to items that can not be pierced by a nail, such as rigid boxes of video games, videos (DVD, etc.) or smart cards. The mode of operation in this variant is identical to the mode of operation in the first embodiment. The autonomous deblocking device then takes a somewhat different form.
[0016] Finally, in at least one embodiment, the coil of the antitheft device is used to recharge the battery of the antitheft device. More specifically, when the lock is removed from the article it protects, it is deposited by the customer or the merchant, in a basket specifically provided for this purpose. This basket includes an inductive coil, powered by a power source, which induces a current in the anti-theft coil, which current is used to recharge the rechargeable battery of the lock. 5.3. Description of a Second Embodiment In this second embodiment, the protection device takes the form of a container, of the bag or box type. This second embodiment is suitable, for example, for articles that can not receive a protection device as described in the first embodiment. Essentially, the components of the protection device in this second embodiment are the same as in the first embodiment and their operation is essentially the same. Thus, in this second embodiment, the protection device comprises a processor, a memory, wireless and non-contact communication interfaces, a screen, a power source. However, it does not necessarily include a locking and unlocking member as described above, since it is not used to be attached to a particular article. On the contrary, the protection device, in a first variant this second embodiment, is intended to receive one or more items that a customer or a consumer wishes to acquire in a single act of purchase.
[0017] To replace the locking and unlocking member described in the first embodiment, an electromagnetic device is used. This device has a function: the first function is to allow detection, for example by a security portal, of an attempted theft of the device (and any items it contains). Incidentally, this device also performs the function of inhibiting existing protection systems on the 25 items that the user wishes to purchase. As explained above, a majority of current consumer items are now equipped with contactless tags (RFID). They play the role of both product identifier and anti-theft device. According to the proposed technique, an electromagnetic field is used to neutralize this non-contact label after payment by the customer of the articles which it has placed in the protective device of the present technique. Indeed, as in the first embodiment, in this embodiment, the antitheft device comprises a set of means for making a payment. More particularly, the antitheft device comprises autonomous neutralization means. These autonomous neutralization means are, in this embodiment, in the form of a source of electrical energy (such as a rechargeable battery, which may be the same as that used to operate the processor) and an electromagnetic neutralization device (for example a coil of wire). The electromagnetic device is able, for example, to annihilate the non-contact label by producing a sufficiently strong electromagnetic field. The electromagnetic device is thus powered by the source of electrical energy. It is able to unlock the lock. To do this, the electromagnetic device receives an unlocking command, which command can be transmitted in at least two different ways: in a first variant, the unlocking command is transmitted via a processor (P1), which is itself integrated in the antitheft, this processor being also in charge of the realization of a payment transaction; in this variant, the antitheft device is therefore (at least partially) autonomous for carrying out the payment transaction; in a second sub-variant, the unlocking command is also transmitted via a processor (P1), which is also integrated in the antitheft device; on the other hand, this processor is not in charge of the realization of the payment transaction. It merely receives orders from a central system, for example a point-of-sale payment and collection system; the anti-theft processor then acts as a relay between the point-of-sale payment and payment system and the user's means of payment. In this variant of the second embodiment, the implementation of the payment is performed in the same manner as in the first embodiment.
[0018] In this second embodiment, the anti-theft device may take the form of a box, a basket, etc. Thus, for example, the basket is taken by the customer at the entrance of the store, and allows to introduce products and withdraw the products and then pay them. The basket is then "smart" and is able, with the means described above to make a total of the amount of items inserted therein; The basket is also an anti-theft device and it is the payment card that releases the antitheft system from the basket and allows the customer to make purchases after payment. It can be expected that the basket "rings" 3034559 18 when the customer withdraws an item without payment, which assumes that the basket must be able to detect the entry and exit of an article. To solve this problem, the basket is equipped with a detector. Such a detector is in the form of, for example, one or two infrared cells and a corresponding infrared LED. When a hand enters the basket, the detector records the passage of it. It detects either the addition of an article or the removal of an article. The insertion area of the items in the basket is shaped to ensure that only one item can be inserted (or removed) at a time. When the detector detects the insertion of an article, it triggers the implementation of an RFID tag reader (inserted in the basket), to obtain at least the price of the article that has just been inserted. (either by connecting to a database or directly in the label): to do so, it uses the means, including communication and scanning described above. The price is added to the total price of the items in the basket. When the detector detects the removal of an article, it triggers the implementation of an RFID tag reader (inserted in the basket), to obtain at least the price of the item that has just been removed ( either by connecting to a database or directly in the label): to do so, it uses the means, including communication and scanning described above. The price is subtracted from the total price of items in the basket. As indicated above, when the articles present in the basket have been set, for example with one of the methods described above, a command to unlock the RFID tags of the products of the basket is transmitted. The electromagnetic device receives the release command and for example implements an electromagnetic discharge which causes a deactivation of the labels. 25
权利要求:
Claims (10)
[0001]
REVENDICATIONS1. An anti-theft device of the type comprising an anti-theft electronic device, characterized in that it comprises: a device for deactivating the anti-theft electronic device; power supply means, at least indirectly supplying said deactivating member of the electronic burglarproof device; means for receiving a deactivation command of the electronic antitheft device.
[0002]
2. Device according to claim 1, characterized in that it comprises a contactless communication module.
[0003]
3. Device according to claim 1, characterized in that it further comprises: a processor for managing at least one mode of operation of the anti-theft device; a memory for storing relevant data.
[0004]
4. Device according to claim 3, characterized in that the processor manages at least two modes of operation comprising: a configuration mode in which the device is able to receive relevant data in the storage memory; a mode of protection.
[0005]
5. Device according to claim 4, characterized in that the protection mode comprises a sub payment mode in which the device performs at least part of a payment transaction from a payment means.
[0006]
6. Device according to claim 4, characterized in that the mode of protection mode comprises a sub-unlock mode in which the device controls the deactivating member of the electronic burglar-proof device, using the processor. 3034559 20
[0007]
7. Device according to claim 6, characterized in that the unlocking mode is activated in at least two different ways: upon receipt of a release command from the processor of the device, this unlocking command resulting from a deblocking command. payment made at least in part, using the processor; upon receipt of a release command from the processor of the device, this release command resulting from a payment made by a management system of a point of sale in which the protection device is positioned; 10
[0008]
8. Device according to claim 4, characterized in that the mode of protection mode comprises a permanent locking mode, wherein said device annihilates an attempt to implement another sub mode of operation. 15
[0009]
9. Device according to claim 1, characterized in that it further comprises means for displaying at least one useful data for a consumer.
[0010]
10. Device according to claim 1, characterized in that it is integrated within a basket. 20
类似技术:
公开号 | 公开日 | 专利标题
CA2873945C|2020-07-21|Device for protecting a commercial article against theft
EP3278312B1|2019-11-06|Device for protection against theft
CA2058947C|2001-04-10|Process and device for registering and checking items
EP2759975B1|2017-06-07|Tag system, sellable item and method for facilitating the purchase of a sellable item
EP2136321A1|2009-12-23|Contactless multifunctional electronic tag for goods
EP2872715B1|2019-02-27|System and method for managing the unlocking of an anti-theft device
EP2449508B1|2013-06-05|Method and system for the automated management of objects provided with rfid tags
CA2439516A1|2003-07-10|Non-contact portable object comprising at least a peripheral device coneected to the same antenna as the chip
FR3058245B1|2019-08-02|TROLLEY OR OTHER CONTAINER COMPRISING MEANS OF OPTIMIZED AND REAL-TIME DETERMINATION OF ITS CONTENT
WO2006120350A2|2006-11-16|Benefit management method and system for any type of bank card
FR2823898A1|2002-10-25|Clothes protection/identification clothing tag having transponder chip sewn in label attached clothing and memory remotely reader accessible.
EP3246846B1|2019-09-18|Communication system, service-provision system comprising such a communication system, and associated method
KR20210059330A|2021-05-25|System and Method for Selling Product Using Antitheft Cabinet with Unattended Payment and Refund
FR2798211A1|2001-03-09|PORTABLE ELECTRONIC DEVICE WITH DISPLAY AND MANAGEMENT OF PROMOTIONAL COUPONS
FR2996330A1|2014-04-04|ANTI-FRAUD MAT
FR2800186A1|2001-04-27|Product management system based on non-contact electronic tags, storing data in tag memory relating to product attributes which can be read and modified by interrogating stations interfaced with computer during product lifetime
FR3099272A1|2021-01-29|Securing method, and associated electronic device
FR2950994A1|2011-04-08|METHOD AND SYSTEM FOR MANAGING ARTICLES WITHIN A PLURALITY OF DISTRIBUTION PLATFORMS
FR3089668A1|2020-06-12|Personalization system using near field communication.
WO2017072056A1|2017-05-04|Method for processing data on a multimedia payment terminal, corresponding devices and computer programs
WO2010066967A1|2010-06-17|Electronic module, in particular an electronic loyalty card
Volpato Filho et al.0|A New Kind of Shopping Experience with no Cashier or Lines
FR2953669A1|2011-06-10|System for favorising sale of goods at large sale areas, has client devices allocated to clients for accompanying functions of system, and commercial bag placed near one of sale locations to trigger message relative to goods
同族专利:
公开号 | 公开日
CA2981358A1|2016-10-06|
EP3278312B1|2019-11-06|
US20180121904A1|2018-05-03|
US10217104B2|2019-02-26|
EP3278312A1|2018-02-07|
FR3034559B1|2018-08-17|
WO2016156533A1|2016-10-06|
ES2770686T3|2020-07-02|
引用文献:
公开号 | 申请日 | 公开日 | 申请人 | 专利标题
EP1306821A2|2001-10-23|2003-05-02|Ncr International Inc.|Automatic electronic article surveillance for self-checkout|
EP2759975A1|2013-01-24|2014-07-30|Nxp B.V.|Tag system, sellable item and method for facilitating the purchase of a sellable item|
US4187509A|1977-06-20|1980-02-05|Knogo Corporation|Wafer and fastener for use in electronic theft detection system|
US6619546B1|2002-03-14|2003-09-16|Wal-Mart Stores, Inc.|Systems and methods for pre-scanning merchandise in customer's shopping cart while customer is waiting in checkout line|
US7619527B2|2005-02-08|2009-11-17|Datalogic Scanning, Inc.|Integrated data reader and electronic article surveillance system|US10480219B2|2017-03-20|2019-11-19|All-Tag Corporation|Method and apparatus for upgrading ink stain antitheft tags with RFID communications function|
US20180330386A1|2017-05-09|2018-11-15|Heonsu Kim|Proof of ownership device and methods for using the same|
FR3084501A1|2018-07-24|2020-01-31|Optilook|UNIVERSAL LABEL RADIO DOOR DEVICE FOR OPTICAL GLASSES MOUNTS IN ORDER TO AVOID THE PERTUBATION OF MAGNETIC FIELDS WHICH MAY BE INTRODUCED BY THE COMPOSITION OF THE MOUNTS|
法律状态:
2016-03-18| PLFP| Fee payment|Year of fee payment: 2 |
2016-10-07| PLSC| Publication of the preliminary search report|Effective date: 20161007 |
2017-03-24| PLFP| Fee payment|Year of fee payment: 3 |
2017-10-13| CD| Change of name or company name|Owner name: INGENICO GROUP, FR Effective date: 20170912 |
2018-03-28| PLFP| Fee payment|Year of fee payment: 4 |
2020-03-16| PLFP| Fee payment|Year of fee payment: 6 |
2021-12-10| ST| Notification of lapse|Effective date: 20211105 |
优先权:
申请号 | 申请日 | 专利标题
FR1552762|2015-03-31|
FR1552762A|FR3034559B1|2015-03-31|2015-03-31|FLIGHT PROTECTION DEVICE, CORRESPONDING COMPUTER PROGRAM AND METHOD|FR1552762A| FR3034559B1|2015-03-31|2015-03-31|FLIGHT PROTECTION DEVICE, CORRESPONDING COMPUTER PROGRAM AND METHOD|
EP16717277.4A| EP3278312B1|2015-03-31|2016-03-31|Device for protection against theft|
PCT/EP2016/057142| WO2016156533A1|2015-03-31|2016-03-31|Device for protection against theft|
US15/562,720| US10217104B2|2015-03-31|2016-03-31|Device for protection against theft, corresponding method and computer program|
ES16717277T| ES2770686T3|2015-03-31|2016-03-31|Theft protection device|
CA2981358A| CA2981358A1|2015-03-31|2016-03-31|Device for protection against theft|
[返回顶部]