SlideShare a Scribd company logo
1 of 11
By: Harsh Modi
Valsad
Introduction of the inventor
• Arthur Minasy (1925 – 9 May 1994) was an
American inventor. His most famous
invention was in 1966, when he
invented surveillance tags that could be
attached to items in stores to prevent
shoplifting.
• Minasy graduated from New York University
with an engineering degree in 1949 and
a master's degree in industrial engineering
in 1952.
Types of tags used in retailer shops
• RFID Tags
• Ink Tags
• Specialty Tags
RFID tAGS
Plastic Security Tags clip a radio-frequency identification chip directly
onto an item. When the chip crosses the detection sensor, an alarm is
triggered to alert store employees to the theft. These tags are available
in many forms, such as gator, clam shell and golf ball. In these styles,
the two sides of the tag interlock with each other to make it difficult for
thieves to remove. Each type of interlocking clip may require its own
special opening tool. In contrast, strip tags have an adhesive backing
that sticks to a piece of merchandise.
Ink tags
Ink Tags are geared toward preventing shoplifting instead of triggering
an alarm when a theft does occur. They typically are used on clothing
items that would be ruined if stained with ink. When the tag is
removed without the benefit of the tool the store cashier uses, a vial
inside bursts and spills ink onto the item. The ink vials can be combined
with standard RFID chips to provide an added level of protection.
However, smaller stores often use ink tags alone to save on the cost of
installing a detection system.
Speciality Tags
Certain types of specialty merchandise require their own customized
security tag solution. For example, liquor bottle tags attach to the cap
and set off an alarm when the cap is twisted open. Eyeglass Security
tags attach to the frame, usually at the temples or near the end of the
earpieces. The thin design of the tags allow them to stick onto the
glasses without interfering with a customer's ability to try them on.
Shackle tags can be used to secure the handles of briefcases and
purses.
Detection Systems
• Without a detection system, security tags are
useless. Detectors typically are placed on both
sides of each of the store's exits. When the
sensor passes the detectors, the alarm goes
off. Most tags also can be programmed to set
off an alarm if someone attempts to remove
them without the proper tool. The detection
system usually is connected to software that
controls the sensitivity, volume and duration
of the alarm. Sensonmatic and Checkpoint are
the two most commonly used retail security
programs.
Working
If you walk through the doorway without paying for
something, the radio waves from the transmitter (hidden in
on one of the door gates) are picked up by the coiled
metal antenna in the label. This generates a tiny electrical
current that makes the label transmit a new radio signal of
its own at a very specific frequency. The receiver (hidden in
the other door gate) picks up the radio signal that the tag
transmits and sounds the alarm. Why doesn't the alarm
sound when you pay for something? You may have noticed
that the checkout assistant passes your item over or through
a deactivating device (sometimes it's incorporated into the
ordinary barcode scanning mechanism, and sometimes it's
completely separate). This destroys or deactivates the
electronic components in the RF label so they no longer pick
up or transmit a signal when you walk through the gates and
the alarm does not sound.
Eas
(electronic article surveillance)
Elements:
1. Antenna
2. Security Tags
3. Security tag removal
4. Security labels
5. Security label deactivation
Removal & Deactivation
• Security tags require removal when a product is sold. This simple process
occurs using a detacher device which is mounted or installed in the counter
at the Point of Sale. Either a mechanical device or a high-powered magnet,
the detacher releases the security tag’s locking mechanism and allows the
tag to be removed. Tags can then be re-used on other products.
• Security labels are usually deactivated by a deactivator that is situated at
the point of sale or integrated into the scanner. This deactivator works by
breaking a circuit within a label so they no longer emit a signal and can
pass near an antenna without causing an alarm to sound. Labels cannot be
re-used.
HARSH MANISH MODI
(to be robotics engineer)

More Related Content

Similar to Anti-Shoplifting Devices

One of the best EAS Anti Theft supplier and manufacturer | Indian Barcode Cor...
One of the best EAS Anti Theft supplier and manufacturer | Indian Barcode Cor...One of the best EAS Anti Theft supplier and manufacturer | Indian Barcode Cor...
One of the best EAS Anti Theft supplier and manufacturer | Indian Barcode Cor...INDIAN BARCODE CORPORATION
 
sdr using rfid application
sdr using rfid applicationsdr using rfid application
sdr using rfid applicationPriyanka Singh
 
Is Your Data Literally Walking Out the Door-presentation
Is Your Data Literally Walking Out the Door-presentationIs Your Data Literally Walking Out the Door-presentation
Is Your Data Literally Walking Out the Door-presentationMike Saunders
 
How does a home security system work
How does a home security system work How does a home security system work
How does a home security system work nishiyath
 
How does a home security system work
How does a home security system work How does a home security system work
How does a home security system work nishiyath
 
Electronic security system
Electronic security systemElectronic security system
Electronic security systemAtharva Chavan
 
Xpanda improving-your-security-mindset
Xpanda improving-your-security-mindsetXpanda improving-your-security-mindset
Xpanda improving-your-security-mindsetMichaelRathbon
 
Applications & use of label films
Applications & use of label filmsApplications & use of label films
Applications & use of label filmsCosmo Films Ltd
 
Is Your Data Literally Walking Out the Door?
Is Your Data Literally Walking Out the Door?Is Your Data Literally Walking Out the Door?
Is Your Data Literally Walking Out the Door?Mike Saunders
 
DO SECURITY SIGNS DETER CRIMINALS AND CRIMINAL BEAHVIOUR.pdf
DO SECURITY SIGNS DETER CRIMINALS AND CRIMINAL BEAHVIOUR.pdfDO SECURITY SIGNS DETER CRIMINALS AND CRIMINAL BEAHVIOUR.pdf
DO SECURITY SIGNS DETER CRIMINALS AND CRIMINAL BEAHVIOUR.pdfBoney Maundu Slim
 

Similar to Anti-Shoplifting Devices (20)

EAS solution
EAS solutionEAS solution
EAS solution
 
Anti-Theft System
Anti-Theft SystemAnti-Theft System
Anti-Theft System
 
Anti-Theft System By MINDWARE
Anti-Theft System By MINDWAREAnti-Theft System By MINDWARE
Anti-Theft System By MINDWARE
 
One of the best EAS Anti Theft supplier and manufacturer | Indian Barcode Cor...
One of the best EAS Anti Theft supplier and manufacturer | Indian Barcode Cor...One of the best EAS Anti Theft supplier and manufacturer | Indian Barcode Cor...
One of the best EAS Anti Theft supplier and manufacturer | Indian Barcode Cor...
 
EAS Security Tags and Detachers.pptx
EAS Security Tags and Detachers.pptxEAS Security Tags and Detachers.pptx
EAS Security Tags and Detachers.pptx
 
sdr using rfid application
sdr using rfid applicationsdr using rfid application
sdr using rfid application
 
Is Your Data Literally Walking Out the Door-presentation
Is Your Data Literally Walking Out the Door-presentationIs Your Data Literally Walking Out the Door-presentation
Is Your Data Literally Walking Out the Door-presentation
 
How does a home security system work
How does a home security system work How does a home security system work
How does a home security system work
 
How does a home security system work
How does a home security system work How does a home security system work
How does a home security system work
 
How To Make Your Security
How To Make Your SecurityHow To Make Your Security
How To Make Your Security
 
Supply Chain Usage
Supply Chain UsageSupply Chain Usage
Supply Chain Usage
 
Electronic security system
Electronic security systemElectronic security system
Electronic security system
 
Xpanda improving-your-security-mindset
Xpanda improving-your-security-mindsetXpanda improving-your-security-mindset
Xpanda improving-your-security-mindset
 
MNT PDF.pdf
MNT PDF.pdfMNT PDF.pdf
MNT PDF.pdf
 
United alarm1
United alarm1United alarm1
United alarm1
 
(Spring 2012) RFID and Security Vulnerabilities
(Spring 2012) RFID and Security Vulnerabilities(Spring 2012) RFID and Security Vulnerabilities
(Spring 2012) RFID and Security Vulnerabilities
 
Applications & use of label films
Applications & use of label filmsApplications & use of label films
Applications & use of label films
 
Is Your Data Literally Walking Out the Door?
Is Your Data Literally Walking Out the Door?Is Your Data Literally Walking Out the Door?
Is Your Data Literally Walking Out the Door?
 
Home Security
Home SecurityHome Security
Home Security
 
DO SECURITY SIGNS DETER CRIMINALS AND CRIMINAL BEAHVIOUR.pdf
DO SECURITY SIGNS DETER CRIMINALS AND CRIMINAL BEAHVIOUR.pdfDO SECURITY SIGNS DETER CRIMINALS AND CRIMINAL BEAHVIOUR.pdf
DO SECURITY SIGNS DETER CRIMINALS AND CRIMINAL BEAHVIOUR.pdf
 

Recently uploaded

What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacingjaychoudhary37
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLDeelipZope
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2RajaP95
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxvipinkmenon1
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZTE
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 

Recently uploaded (20)

What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacing
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptx
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 

Anti-Shoplifting Devices

  • 2. Introduction of the inventor • Arthur Minasy (1925 – 9 May 1994) was an American inventor. His most famous invention was in 1966, when he invented surveillance tags that could be attached to items in stores to prevent shoplifting. • Minasy graduated from New York University with an engineering degree in 1949 and a master's degree in industrial engineering in 1952.
  • 3. Types of tags used in retailer shops • RFID Tags • Ink Tags • Specialty Tags
  • 4. RFID tAGS Plastic Security Tags clip a radio-frequency identification chip directly onto an item. When the chip crosses the detection sensor, an alarm is triggered to alert store employees to the theft. These tags are available in many forms, such as gator, clam shell and golf ball. In these styles, the two sides of the tag interlock with each other to make it difficult for thieves to remove. Each type of interlocking clip may require its own special opening tool. In contrast, strip tags have an adhesive backing that sticks to a piece of merchandise.
  • 5. Ink tags Ink Tags are geared toward preventing shoplifting instead of triggering an alarm when a theft does occur. They typically are used on clothing items that would be ruined if stained with ink. When the tag is removed without the benefit of the tool the store cashier uses, a vial inside bursts and spills ink onto the item. The ink vials can be combined with standard RFID chips to provide an added level of protection. However, smaller stores often use ink tags alone to save on the cost of installing a detection system.
  • 6. Speciality Tags Certain types of specialty merchandise require their own customized security tag solution. For example, liquor bottle tags attach to the cap and set off an alarm when the cap is twisted open. Eyeglass Security tags attach to the frame, usually at the temples or near the end of the earpieces. The thin design of the tags allow them to stick onto the glasses without interfering with a customer's ability to try them on. Shackle tags can be used to secure the handles of briefcases and purses.
  • 7. Detection Systems • Without a detection system, security tags are useless. Detectors typically are placed on both sides of each of the store's exits. When the sensor passes the detectors, the alarm goes off. Most tags also can be programmed to set off an alarm if someone attempts to remove them without the proper tool. The detection system usually is connected to software that controls the sensitivity, volume and duration of the alarm. Sensonmatic and Checkpoint are the two most commonly used retail security programs.
  • 8. Working If you walk through the doorway without paying for something, the radio waves from the transmitter (hidden in on one of the door gates) are picked up by the coiled metal antenna in the label. This generates a tiny electrical current that makes the label transmit a new radio signal of its own at a very specific frequency. The receiver (hidden in the other door gate) picks up the radio signal that the tag transmits and sounds the alarm. Why doesn't the alarm sound when you pay for something? You may have noticed that the checkout assistant passes your item over or through a deactivating device (sometimes it's incorporated into the ordinary barcode scanning mechanism, and sometimes it's completely separate). This destroys or deactivates the electronic components in the RF label so they no longer pick up or transmit a signal when you walk through the gates and the alarm does not sound.
  • 9. Eas (electronic article surveillance) Elements: 1. Antenna 2. Security Tags 3. Security tag removal 4. Security labels 5. Security label deactivation
  • 10. Removal & Deactivation • Security tags require removal when a product is sold. This simple process occurs using a detacher device which is mounted or installed in the counter at the Point of Sale. Either a mechanical device or a high-powered magnet, the detacher releases the security tag’s locking mechanism and allows the tag to be removed. Tags can then be re-used on other products. • Security labels are usually deactivated by a deactivator that is situated at the point of sale or integrated into the scanner. This deactivator works by breaking a circuit within a label so they no longer emit a signal and can pass near an antenna without causing an alarm to sound. Labels cannot be re-used.
  • 11. HARSH MANISH MODI (to be robotics engineer)