Login| Sign Up| Help| Contact|

Patent Searching and Data


Title:
MODIFICATION OF TRIGGER THRESHOLDS OF RFID DEVICES IN AN ELECTRONIC ARTICLE SURVEILLANCE SYSTEM
Document Type and Number:
WIPO Patent Application WO/2021/158926
Kind Code:
A1
Abstract:
Electronic surveillance article systems reducing the number and likelihood of false alarms are provided. Such systems include two read zones, with a second read zone having an associated RFID reader configured to detect an RFID device at a trigger threshold. The trigger threshold may be set or modified in view of a value of a sensor of an RFID device (sensing a capacitance or dielectric permittivity or temperature or degree of movement, for example), the number of times the RFID device is detected in the first read zone, or whether the RFID device is detected in the first read zone under predetermined conditions. Such systems may also or alternatively initiate a response (e.g., modifying the trigger threshold or the amount of power transmitted by an RFID reader) when an RFID guard device associated with a piece of infrastructure in the first read zone is detected in the second read zone.

Inventors:
FORSTER IAN (US)
Application Number:
PCT/US2021/016836
Publication Date:
August 12, 2021
Filing Date:
February 05, 2021
Export Citation:
Click for automatic bibliography generation   Help
Assignee:
AVERY DENNISON RETAIL INFORMATION SERVICES LLC (US)
International Classes:
G08B13/24; G08B29/18
Domestic Patent References:
WO2014150531A12014-09-25
Foreign References:
US20120044074A12012-02-23
US20180350218A12018-12-06
Attorney, Agent or Firm:
TERAPANE, Michael, J. et al. (US)
Download PDF:
Claims:
Claims

What is claimed is:

1. An electronic article surveillance system, comprising: a first read zone including an associated first RFID reader; a second read zone including an associated second RFID reader configured to detect an RFID device at a trigger threshold; and a controller configured to set the trigger threshold based at least in part on a factor selected from the group consisting of a value of a sensor of the RFID device, a number of times that the RFID device is detected in the first read zone, whether the RFID device is detected in the first read zone under predetermined conditions, and combinations thereof.

2. The electronic article surveillance system of claim 1, wherein the value of the sensor comprises a capacitance.

3. The electronic article surveillance system of claim 1, wherein the value of the sensor comprises a dielectric permittivity.

4. The electronic article surveillance system of claim 1, wherein the value of the sensor comprises a temperature.

5. The electronic article surveillance system of claim 1, wherein the value of the sensor comprises a degree of movement, and the controller is configured to decrease the trigger threshold upon movement of the RFID device.

6. The electronic article surveillance system of claim 5, wherein the controller is further configured to temporarily increase the trigger threshold upon movement of the RFID device.

7. The electronic article surveillance system of any one of claims 1-6, wherein the first read zone comprises an inventory zone and the second read zone comprises a detection zone separated from the inventory zone by a transition zone.

8. The electronic article surveillance system of any one of claims 1-7, wherein said predetermined conditions are selected from the group consisting of there being no people in the inventory zone and there being no RFID device being moved between the inventory zone and the detection zone.

9. The electronic article surveillance system of any one of claims 1-8, further comprising an inventory zone, wherein the second read zone comprises a detection zone separated from the inventory zone by a transition zone, and the first read zone is configured to receive the RFID device before the RFID device is received within the inventory zone.

10. The electronic article surveillance system of any one of claims 1-9, wherein the number of times that an RFID device is detected in the first read zone is encoded into the RFID device.

11. The electronic article surveillance system of claim 10, wherein the number of times that an RFID device is detected in the first read zone is stored in a database that is accessible by the controller.

12. The electronic article surveillance system of any one of claims 1-11, wherein the same RFID reader is associated with the first and second read zones.

13. The electronic article surveillance system of any one of claims 1-11, wherein separate RFID readers are associated with the first and second read zones.

14. A method of controlling an electronic article surveillance system including first and second read zones, with an RFID device being detected in the second read zone at a trigger threshold, the method comprising setting the trigger threshold based at least in part on a factor selected from the group consisting of a value of a sensor of an RFID device, a number of times that an RFID device is detected in the first read zone, and whether an RFID device is detected in the first read zone under predetermined conditions.

15. An electronic article surveillance system, comprising: a first read zone including an associated first RFID reader; a piece of infrastructure at least partially positioned within the first read zone; an RFID guard device secured with respect to the piece of infrastructure; a second read zone including an associated second RFID reader configured to detect an RFID inventory device associated with a piece of inventory removably associated with the piece of infrastructure at a trigger threshold; and a controller configured to, when the RFID guard device is detected by any of the RFID reader, initiate a response selected from the group consisting of modifying the trigger threshold, modifying an amount of power transmitted by the RFID reader associated with the second read zone, modifying a direction in which power is transmitted by the RFID reader associated with the second read zone, transmitting a signal indicative of a need to move the piece of infrastructure away from the second read zone, and combinations thereof.

16. The electronic article surveillance system of claim 15, further comprising a second piece of infrastructure and a second RFID guard device secured with respect to the second piece of infrastructure, wherein the RFID guard devices have different sensitivity grades, and the controller is configured to initiate a different response depending on the sensitivity grade of the RFID guard detected by the RFID reader.

17. The electronic article surveillance system of claim 15 or claim 16, wherein the RFID guard device includes a plurality of RFID chips coupled to an antenna, each of the plurality of RFID chips is configured to be detected at a different power transmitted by the RFID reader, and the response initiated by the controller is based at least in part on which RFID chip is detected by the RFID reader.

18. The electronic article surveillance system of any one of claims 15-17, wherein the same RFID reader is associated with the first and second read zones.

19. The electronic article surveillance system of any one of claims 15-17, wherein separate RFID readers are associated with the first and second read zones.

20. A method of controlling an electronic article surveillance system including first and second read zones, with a piece of infrastructure at least partially positioned within the first read zone and having an associated first RFID guard device, and with an RFID inventory device associated with a piece of inventory removably associated with the piece of infrastructure being detected in the second read zone at a trigger threshold, the method comprising, upon detecting the second RFID guard device in the second read zone, initiating a response selected from the group consisting of modifying the trigger threshold, modifying an amount of power transmitted by an RFID reader associated with the second read zone, modifying a direction in which power is transmitted by the RFID reader associated with the second read zone, and transmitting a signal indicative of a need to move the piece of infrastructure away from the second read zone.

Description:
Modification of Trigger Thresholds of RFID Devices in an Electronic Article Surveillance System

Cross-Reference to Related Application

[0001] The present application claims the benefit of U.S. Provisional Patent Application No. 62/970,933 filed February 6, 2020, which is incorporated herein by reference in its entirety.

Field

[0002] The present subject matter relates to radio frequency identification ("RFID") devices. More particularly, the present subject matter relates to controlling the trigger thresholds of RFID devices used in an electronic article surveillance ("EAS") system.

Background

[0003] In retail stores, an accurate count of the products on display and/or in inventory is important. Additionally, it is important to have an effective anti-theft system in place. RFID tags and labels (which may be collectively referred to herein as "RFID devices") have been employed to perform both of these functions.

[0004] An EAS system employing RFID technology typically has two primary read zones, each of which includes an associated RFID reader. One of the read zones is an area in the store where the products are presented to the consumer (which may be referred to herein as "inventory zone"), while the other read zone is an area at the exit of the store where any RFID devices that have not been suitably deactivated may be detected (which may be referred to herein as a "detection zone") to trigger some type of alarm, indicating that an attempt is being made to steal the product(s). Typically, when a customer properly purchases an item, the cashier either removes or deactivates the RFID device associated with it. If the RFID device is not removed or deactivated, an RFID reader or readers will read the device and cause an alarm or other alert to trigger in the detection zone.

[0005] Although the above-described systems are widespread, there are certain disadvantages. When using RFID devices/systems for an EAS system, one common problem is that the read range of an RFID device in certain circumstances can be large enough that an RFID device in the inventory zone can be read in the detection zone or vice versa. To reduce this risk, a transition zone is frequently provided between the inventory zone and the detection zone to physically separate the two read zones. However, on account of different RFID devices having greater sensitivity at an operating frequency and/or different articles having different effects on the performance of the associated RFID devices, it is necessary for the transition zone to be relatively large. Large transition zones mean smaller inventory zones which means less physical space for the retailer to present merchandise to consumers and therefore lost sales (revenue).

[0006] There exists a need for an inventory management/EAS system in which the inventoru zone is maximized while the transition zone is reduced or minimized yet still effective at detecting theft and reducing or minimizing false alarms.

[0007] It would, thus, be advantageous to provide an EAS system that is configured in a way that allows for the size of the transition zone to be reduced and/or for the incidence of false alarms to be reduced.

Summary

[0008] There are several aspects of the present subject matter which may be embodied separately or together in the devices, systems, and methods described and claimed below. These aspects may be employed alone or in combination with other aspects of the subject matter described herein, and the description of these aspects together is not intended to preclude the use of these aspects separately or the claiming of such aspects separately or in different combinations as may be set forth in the claims appended hereto.

[0009] In one aspect, an electronic article surveillance system includes a first read zone having an associated RFID reader and a second read zone having an associated RFID reader configured to detect an RFID device at a trigger threshold. The system further includes a controller configured to set the trigger threshold based at least in part on a factor selected from the group consisting of a value of a sensor of an RFID device, a number of times that an RFID device is detected in the first read zone, and whether an RFID device is detected in the first read zone under predetermined conditions.

[0010] In another aspect, a method is provided for controlling an electronic article surveillance system having first and second read zones, with an RFID device being detected in the second read zone at a trigger threshold. The method includes setting the trigger threshold based at least in part on a factor selected from the group of a value of a sensor of an RFID device, a number of times that an RFID device is detected in the first read zone, whether an RFID device is detected in the first read zone under predetermined conditions, and combinations thereof. [0011] In yet another aspect, an electronic article surveillance system includes a first read zone including an associated RFID reader, with a piece of infrastructure at least partially positioned within the first read zone. An RFID guard device is secured with respect to the piece of infrastructure. A second read zone of the systems includes an associated RFID reader configured to detect an RFID inventory device associated with a piece of inventory removably associated with the piece of infrastructure at a trigger threshold. The system also includes a controller configured to, when the RFID guard device is detected by the RFID reader, initiate a response selected from the group consisting of modifying the trigger threshold, modifying an amount of power transmitted by the RFID reader associated with the second read zone, modifying a direction in which power is transmitted by the RFID reader associated with the second read zone, and transmitting a signal indicative of a need to move the piece of infrastructure away from the second read zone.

[0012] In another aspect, a method is provided for controlling an electronic article surveillance system having first and second read zones, with a piece of infrastructure at least partially positioned within the first read zone and having an associated RFID guard device, and with an RFID inventory device associated with a piece of inventory removably associated with the piece of infrastructure being detected in the second read zone at a trigger threshold. The method includes, upon detecting the RFID guard device in the second read zone, initiating a response selected from the group consisting of modifying the trigger threshold, modifying an amount of power transmitted by an RFID reader associated with the second read zone, modifying a direction in which power is transmitted by an RFID reader associated with the second read zone, and transmitting a signal indicative of a need to move the piece of infrastructure away from the second read zone.

Brief Description of the Drawings

[0013] Fig. 1 is an illustrative representation of an exemplary embodiment of an electronic article surveillance system according to an aspect of the present disclosure.

[0014] Fig. 2 is an illustrative representation of another exemplary embodiment of an electronic article surveillance system according to an aspect of the present disclosure.

Detailed Description

[0015] As required, detailed embodiments of the present invention are disclosed herein; however, it is to be understood that the disclosed embodiments are merely exemplary of the invention, which may be embodied in various forms. Therefore, specific details disclosed herein are not to be interpreted as limiting, but merely as a basis for the claims and as a representative basis for teaching one skilled in the art to variously employ the present invention in virtually any appropriate manner.

[0016] Fig. 1 shows an EAS system 10 employing RFID technology according to an aspect of the present disclosure. The EAS system 10 of Fig. 1 has an inventory zone 12 and a detection zone 14, with a transition zone 16 separating the two read zones 12 and 14. The EAS system 10 further includes a controller 18, which is coupled to a first RFID reader 20 associated with the inventory zone 12 and a second RFID reader 22 associated with the detection zone 14. A plurality of pieces of inventory 24 and 26 are shown as being positioned within the inventory zone 12, with each piece of inventory 24, 26 having an associated RFID device 28, 30 (which may be referred to herein as an RFID inventory device). The pieces of inventory 24 and 26 may be differently configured, thereby differently affecting the performance of the associated RFID device 28, 30, as will be described in greater detail herein.

[0017] As explained above, the inventory zone 12 represents an area in the store where products are presented to the consumer, while the detection zone 14 represents an area at the exit of the store where any RFID inventory devices that have not been suitably deactivated may be detected to trigger some type of alarm, indicating that an attempt is being made to steal them. When a customer properly purchases an item, the cashier either removes or deactivates the RFID inventory device associated with it. If the RFID inventory device is not removed or deactivated, it will be detected in the detection zone 14, which causes an alarm or other alert to trigger and notify store personnel.

[0018] Each piece of inventory 24, 26 is shown in Fig. 1 as being removably associated with a piece of infrastructure 32, 34 configured to support and display the associated piece or pieces of inventory in the inventory zone 12. In the illustrated embodiment, one of the pieces of infrastructure 32 is configured as a mannequin, while the other piece of infrastructure 34 is configured as a table, though it should be understood that pieces of infrastructure may be otherwise configured without departing from the scope of the present disclosure. In the embodiment of Fig. 1, each piece of infrastructure 32, 34 includes an associated RFID device 36, 38 (which may be referred to herein as an RFID guard device) that is secured with respect to the piece of infrastructure 32, 34 (e.g., by being affixed to the piece of infrastructure 32, 34). Unlike the RFID inventory devices 28 and 30, the RFID guard devices 36 and 38 are not configured to generate an alarm when they are detected in the detection zone 14, but may be used to reduce false alarms arising from the detection of an RFID inventory device in the detection zone 14, as will be described in greater detail.

[0019] The EAS system 10 of Fig. 1 is shown as including an additional read zone 40, which is configured to receive pieces of inventory before they are moved into the inventory zone 12. This initial or preliminary read zone 40 is provided to determine the number of pieces of inventory in stock before the pieces of inventory are moved into the inventory zone 12 for display and consideration by customers. The initial or preliminary read zone 40 may be variously configured without departing from the scope of the present disclosure. In the illustrated embodiment, the initial or preliminary read zone 40 is configured as an RFID read chamber, which includes an associated RFID reader 42 and is configured to receive a plurality of pieces of inventory and their associated RFID devices. An RFID read chamber may be relatively large (e.g., configured to accommodate a plurality of containers loaded on a pallet) or smaller (e.g., configured to accommodate a single container), depending on the needs and configuration of the store. In other embodiments, the initial or preliminary read zone 40 (if provided) may be differently configured, such as being configured as an RFID-enabled gate through which inventory passes before reaching the inventory zone 12 or as a warehouse or storage area in which RFID inventory devices are detected or read by handheld RFID readers operated by store personnel, for example.

[0020] It should be understood that the configuration illustrated in Fig. 1 is merely exemplary and that EAS systems according to the present disclosure may be differently configured without departing from the scope of the present disclosure. For example, while Fig. 1 illustrates separate RFID readers 20 and 22 associated with the inventory zone 12 and the detection zone 14, it is within the scope of the present disclosure for a single RFID reader 46 to be associated with the two zones 12 and 14, as in the EAS system 10' shown in Fig. 2. In some embodiments, the inventory zone and/or the detection zone has a plurality of readers, e.g., 2, 3, 4, 5, or greater. In some embodiments, the plurality of readers is controlled by a single controller. In other embodiments, each of the readers is controlled by its own controller. In still other embodiments, the plurality of readers is controlled by more than one controller but the number of controllers is less than the number of readers, such that at least more than one reader is controlled by one controller.

[0021] Regardless of the particular configuration of the EAS system, the transition zone 16 is ideally sized and configured such that RFID devices (especially RFID inventory devices) positioned in the inventory zone 12 are only detected by the RFID reader 20 associated with the inventory zone 12 and not by the RFID reader 22 associated with the detection zone 14 (or, in the case of the system 10' of Fig. 2, only by a signal emitted by the RFID reader 18 into the inventory zone 12 and not into the detection zone 14). The opposite is also true, with it being advantageous for RFID devices positioned in the detection zone 14 to be detected only in the detection zone 14 and not in the inventory zone 12. This may be achieved by providing a large transition zone 16, although such an approach reduces the size of the inventory zone 12, so it is an unsatisfactory solution.

[0022] According to one aspect of the present disclosure, the size of the transition zone 16 may be decreased by instead adjusting the level at which an RFID inventory device is detected in the detection zone 14 (which level may be referred to herein as the "trigger threshold"). While this aspect of the present disclosure is described in terms of adjustment of the trigger threshold of the detection zone 14 (to prevent false alarms when an RFID inventory device in the inventory zone 12 is detected in the detection zone 14), it should be understood that the trigger threshold of the inventory zone 12 may be similarly adjusted to prevent situations in which an RFID device in the detection zone 14 is detected in the inventory zone 12.

[0023] There are several factors that can affect the performance characteristics of an RFID device (and, thus, whether such an RFID device is detected in a separate read zone), such that there are various conditions that may warrant a change in the trigger threshold for a particular RFID device. According to one approach, an RFID inventory device may include a sensor that records a particular value that may be transmitted to the controller 18 of the EAS system 10, 10'. Depending on the value of the sensor, the controller 18 may determine whether to adjust the trigger threshold for the RFID inventory device in which the sensor is associated, which may include decreasing the trigger threshold (e.g., if the value indicates that the piece of inventory associated with the RFID inventory device is at risk of being stolen) or increasing the trigger threshold (e.g., if the value indicates that the piece of inventory associated with the RFID inventory device is not at risk of being stolen). The various RFID inventory devices may each be programmed with a unique identity to allow the controller 18 to assign an appropriate trigger threshold to the proper RFID inventory device.

[0024] The sensor may be variously configured without departing from the scope of the present disclosure. In one exemplary embodiment, the value of the sensor is a capacitance. Such a sensor may be particularly useful for an auto-tunable RFID device, which is configured to vary its capacitance in order to optimize performance of the RFID device. For example, when an auto-tunable RFID device is associated with a low loss material (e.g., a t-shirt or other light garment), the RFID device will tend to auto tune to a relatively high capacitance to decrease performance peak into a desired RFID reader operating band. In contrast, when an auto-tunable RFID device is associated with or placed into the proximity of a high loss material (e.g., an item having a high water content, such as a human body), the RFID device will tend to auto-tune to a relatively low capacitance to increase performance peak. A relatively high capacitance will call for adjustment of the trigger threshold in one direction, while a relatively low capacitance will call for adjustment of the trigger threshold in the opposite direction. It may also be the case that the sensed capacitance is at a level that requires no adjustment to the trigger threshold.

[0025] In another exemplary embodiment, the sensor may be configured as a dielectric sensor, in which case the value of the sensor is a dielectric permittivity. Such a sensor may be advantageous when an RFID device is not auto-tunable and instead has a performance that is only affected by external factors (e.g., the nature of the associated piece of inventory). Dielectric loading may be determined, in one example, by measuring a value associated with the RFID device, such as received signal strength, as the RFID reader changes frequency. When an RFID device is associated with a light dielectric, read performance will tend to increase with increasing read frequency, whereas read performance will tend to decrease with increasing read frequency for an RFID device associated with a heavy dielectric. When the sensor value indicates association of the RFID device with a light dielectric, the trigger threshold may be increased to prevent false alarms (without increasing the risk that the RFID device will not be properly detected). Conversely, when the sensor value indicates association of the RFID device with a heavy dielectric, the RFID device will have a lower performance, in which case the trigger threshold may be decreased to allow for proper detection of the RFID device without increasing the risk of false alarms. It may also be the case that the sensed dielectric permittivity is at a level that requires no adjustment to the trigger threshold.

[0026] In yet another exemplary embodiment, the sensed value may be a temperature. A piece of merchandise is typically held close to a person when it is being stolen, which tends to increase the sensed temperature. Accordingly, an increase in the temperature of an RFID inventory device indicates that there is an increased risk that an attempt is being made to steal the associated merchandise, in which case the controller 18 may act to decrease the trigger threshold to better ensure that the RFID inventory device is properly detected if it is moved into the detection zone 14 without being deactivated.

[0027] In another exemplary embodiment, the sensed value is a degree of movement. A product being stolen will be in motion towards the store exit (and towards the detection zone 14), whereas items on display in the inventory zone 12 are likely to be stationary. Accordingly, an increase in the degree of movement experienced by an RFID inventory device indicates that there is an increased risk that an attempt is being made to steal the associated merchandise, in which case the controller 18 may act to decrease the trigger threshold to better ensure that the RFID inventory device is properly detected if it is moved into the detection zone 14 without being deactivated. Exemplary motion detectors could be moving objects, such as beams or flaps, that either change a value such as a voltage on a port of the RFID chip of the RFID device, or similar devices that modulate the input impedance of the RFID chip and, therefore, impose a modulation on its response. Materials such as piezoelectric plastics, resistive materials that change when stretched or are compressed, or forms of parallel plate capacitors in which the plate separation is affected by motion may also be used.

[0028] Flowever, while it may generally be proper to decrease the trigger threshold upon sensing movement, that is not always the case. For example, it may be the case that a particular RFID device is associated with a piece of inventory intended to be used to replenish the stock of merchandise in the inventory zone 12 at a time when the EAS system 10, 10' is active. This may be true of an RFID inventory device that has most recently been detected or read in the initial or preliminary read zone 40, as such an RFID inventory device has not yet been moved into the inventory zone 12 for display and consideration of the associated merchandise by customers. For a defined period (e.g., between 15 and 60 minutes), the trigger threshold for such an RFID inventory device may be set to a maximum (or at least elevated) level, as movement of such an RFID inventory device is not indicative of possible theft of the associated merchandise, but is instead indicative of the merchandise being moved into the inventory zone 12. After that time has elapsed, the controller 18 may treat the RFID inventory device as described above, which may include subsequent movement of the RFID inventory device causing the controller 18 to decrease the trigger threshold to better prevent theft of the merchandise associated with the RFID inventory device.

[0029] According to another aspect of the present disclosure, the trigger threshold may be adjusted based on the performance of an RFID inventory device in the initial or preliminary read zone 40. For example, if the initial or preliminary read zone 40 is configured as an RFID read chamber, each RFID device will be read or detected a certain number of times (due to the RFID read chamber including a plurality of antennas configured to emit signals within the RFID read chamber), which may vary based on a number of factors, including the nature of the associated piece of inventory. The number of times that an RFID inventory device is read may be encoded into the RFID device or stored in a database that is accessible by the controller 18 of the EAS system 10, 10'. The controller 18 may adjust the trigger threshold for a particular RFID inventory device based on the number of times that it is read in the RFID read chamber. A low number of reads may indicate that an RFID device is associated with a difficult-to- read product (e.g., merchandise having a high water content), whereas a high number of reads may indicate that an RFID device is associated with an easy-to-read product (e.g., a light garment). For an RFID inventory device having a low number of reads, the trigger threshold may be decreased to better ensure that the RFID inventory device is properly read (without increasing the risk of false alarms). For an RFID inventory device having a high number of reads, the trigger threshold may be increased to decrease the risk of false alarms without increasing the risk that the RFID inventory device will not be properly read or detected.

[0030] According to yet another aspect of the present disclosure, the trigger threshold may be adjusted upon the controller 18 determining that an RFID inventory device has been detected by the RFID reader associated with the read zone in which the RFID inventory device is positioned under predetermined conditions. For example, an RFID inventory device may be read or detected in the inventory zone 12 at a time when there are no people (or at least no customers) in the inventory zone 12 (e.g., as determined by a camera or other means associated with the controller 18) or when there are no RFID inventory devices being moved between the inventory zone 12 and the detection zone 14. RFID inventory devices detected in the inventory zone 12 under these conditions can be considered as being associated with merchandise that is at a lower risk of being stolen (compared to RFID inventory devices detected in the inventory zone 12 while customers are present). The trigger thresholds of such RFID inventory devices may be increased by the controller 18 to better ensure that such RFID inventory devices do not cause false alarms. Upon a customer entering the inventory zone 12, the trigger thresholds for the RFID inventory devices in the inventory zone 12 may be decreased by the controller 18, on account of the risk of theft increasing.

[0031] In some embodiments, any combination of capacitance, dielectric permittivity, temperature, and degree of movement may be used to adjust the trigger threshold.

[0032] While the preceding discussion has been specific to RFID inventory devices, it should be understood that a response or change in the operation of an EAS system may be initiated upon detection of an RFID guard device in the detection zone 14. As described above, an RFID guard device 36, 38 is intended to be positioned and remain within the inventory zone 12, associated with a piece of infrastructure 32, 34 used to display and/or support one or more pieces of inventory 24, 26. Thus, if an RFID guard device is detected in the detection zone 14, it may be indicative of an attempt to steal the associated piece of infrastructure (possibly along with any pieces of inventory associated with the piece of infrastructure) or indicative of the piece of infrastructure being placed too close to the detection zone 14, which may result in a false alarm being caused by an RFID inventory device associated with a piece of inventory associated with the piece of infrastructure corresponding to the RFID guard device.

[0033] Regardless of the circumstances under which an RFID guard device is detected in the detection zone 14, any of a number of responses may be initiated by the system controller 18 to prevent or reduce the likelihood of a false alarm. For example, one possible response is for the controller 18 to modify the trigger threshold of one or more RFID inventory devices associated with pieces of inventory associated with the piece of infrastructure corresponding to the RFID guard device (e.g., adjusting the trigger threshold of an RFID device secured to a shirt being worn by a mannequin in the inventory zone 12), which may include increasing the trigger threshold to reduce false alarms. Another possible response is modifying the amount of power transmitted by the RFID reader associated with the detection zone 14 and/or (if an antenna of the RFID reader is steerable) modifying the direction in which power is transmitted by the RFID reader to avoid detecting the RFID guard device. Yet another possible response is the controller 18 transmitting a signal indicative of a need for store personnel to move the piece of infrastructure associated with the RFID guard device (or the merchandise associated with the piece of infrastructure) away from the detection zone 14. In exemplary embodiments, the signal may be via a company network or via a light or other indicator associated with the piece of infrastructure to signify that there is a need to move the piece of infrastructure or associated merchandise to reduce the risk of false alarms.

[0034] RFID guard devices can come in different sensitivity grades; for example, an "A" may be high sensitivity, and if such an RFID guard device is detected in the detection zone 14, the risk of an overread is relatively low. "B" types may have relatively low sensitivity, and, if detected in the detection zone 14, indicate that the possibility of an overread is significant, in which case a different response may be initiated by the controller 18 compared to the response that would be initiated if an "A" type of RFID guard device was detected. To prevent issues, the trigger threshold for the components of the EAS system 10, 10' configured to detect the RFID guard devices can be increased.

[0035] In an alternative format, an RFID guard device may have more than one identity associated it. An RFID device, at its most basic, includes an RFID chip coupled to an antenna. To provide an RFID guard device with multiple identities, a plurality of different RFID chips may be coupled to a common antenna, with each RFID chip having a different sensitivity (e.g., one "A" type of RFID chip having a high sensitivity, one "B" type of RFID chip having a lower sensitivity, and one "C" type of RFID chip having an even lower sensitivity). By determining which chip or chips is/are being detected in the detection zone 14, the system controller 18 can determine the risk of false alarms and take various actions based on the sensitivity or sensitivities of the detected chip or chips.

[0036] It will be understood that the embodiments described above are illustrative of some of the applications of the principles of the present subject matter. Numerous modifications may be made by those skilled in the art without departing from the spirit and scope of the claimed subject matter, including those combinations of features that are individually disclosed or claimed herein. For these reasons, the scope hereof is not limited to the above description but is as set forth in the following claims, and it is understood that claims may be directed to the features hereof, including as combinations of features that are individually disclosed or claimed herein.