Merchandise Security Library Tags

Merchandise Security Library Tags

Library merchandise security tag is part of a retail merchandise security system. Attached to the goods, it ensures that in the event of theft either an alarm is triggered or the goods become unusable. Merchandise tags are removed or disabled during the regular payment process.

Mechanical labels often contain a color cartridge. They can only be removed with a special tool or with a considerable amount of time. In the illustrated system, this is usually a built-in strong counter in the counter, which retracts the inner part against the spring force and releases a clamped between the balls holding pin. If they are forcibly broken, the color cartridge is emptied. Textiles are discolored and rendered useless in this way. Mechanical security tags may prevent a repeat theft.

Often, mechanical security tags also include a coil and an RFID chip as a combination of mechanical and electronic security systems. Such mechanical systems are reusable.

An electronic article surveillance tag of an electronic article surveillance system (EAS) triggers an alert as the secured article approaches an antenna. Antenna systems for detection are usually located between the cash register and the outlet of the store to report unpaid goods. Modern merchandise security labels can be activated and deactivated by the cashier.

The trend in retail security is already to integrate the corresponding security elements directly into the product or the product packaging. This so-called source tagging restricts the possibilities of manipulation and reduces the costs for the attachment.

There are currently four different electronic article surveillance systems on the market. These are radio frequency, electromagnetic, high-frequency and acousto-magnetic anti-theft systems.

RF labels have some disadvantages, for example, their size and their low selectivity. Thus, various mobile electronic devices such as hearing aids, radios or mobile phones can coincidentally represent with their electrical circuits resonant circuits on the detection frequency. In these cases, an unwanted false alarm is triggered. Unfavorable orientation relative to the antennas or manipulative metal shielding causes only 70 percent of the active tags to be detected. This speaks against their safety function. By shielding the label no magnetic field gets to the coil and the resonant circuit is no longer excited, so that the label for the detection system is invisible. s

There are also the so-called hard tags. These are conical objects made of plastic, which, fastened with a safety pin, are preferably found on textile goods. Inside them is a coil with a ceramic capacitor between its ends. These labels will be removed and reused after purchase at checkout.

The safety pin apparently makes it impossible for the thief to remove this label. These so-called hard tags are removed at the cash register with a sufficiently strong magnet: by the applied magnet, balls that hold the safety pin by a spring force, withdrawn and release the needle. Thus, this system is only a deceptive security.

The picture on the right shows two labels of the so-called electromagnetic method (EM label). The long metal strip in the upper picture is partially obscured by short strips that have slipped out of position. Below it is embedded in paper and recognizable as light gray shading. The metal strip consists of an easily magnetizable alloy.

In the sinusoidal magnetic alternating field of the control gate with a frequency of 10 Hz to 20 kHz, it comes to saturation. The steep edges of the magnetic reversal generate harmonics in the alternating field, which can be easily detected.

RFID Technology: Securing Merchandise

RFID Technology: Securing Merchandise

RFID Technology is best and oldest way of securing merchandise is simply tethering or trapping. Today, mostly wire ropes are used for tying. The so-called Kensington lock is a common variant that is used both in sales rooms and by individuals. Some devices, for example laptops, have a special eyelet for securing with such a device. Especially for high quality, but small goods such as jewelry or electronics and transparent, oversized packaging used to prevent insertion into a bag. Often as a free service, the goods are repackaged at the cash register in a handy packaging but the technology today is taking over using anti-theft solutions, document tracking, Electronic Article Surveillance, Book detection etc.

Another common form is the presentation in a locked display case, from which the goods are brought from the seller. Cell phones, navigation devices or small MP3 players are often backed up with line protection against theft.

In this case, the object is secured, for example, by a USB plug, whereby an alarm is triggered when unauthorized removal of the cable. This supports, among other things, the open access to the object and promotes the desire to buy, because the affected object can be tested despite linen protection.

There are two strategies for attaching electronic article surveillance: The most common is a clearly visible attachment of a label, which can only be removed with special tools. The advantage is the psychological effect, since the customer perceives the goods as secure and casual thieves are deterred. Another variant is the hidden attachment to or in the goods. The backup will not be removed after purchase, but deactivated. The advantage is that a thief must know where to find the backup if he wants to remove it.

The future probably lies in the source tagging, that in the product already in the production / assembly a goods security label is integrated (eg in sales of shoes, sewing label in the suit, in the shank of the drill, under the label of the beverage bottle, etc. ). Source tagging is already being used successfully by several retailers (footwear, etc.), but the penetration rate in comparison to Spain or France is not that high in South Africa.

For this, the incorporated label must have the possibility that it can be activated, deactivated and reactivated. Thus, the goods can always be “made” active or inactive according to their goal.

A chemical security device does not prevent theft, but makes the goods unusable in the event of unauthorized removal or serves as proof of ownership later. For this purpose z. B. a chemical in a fragile container attached to the goods, so that this breaks when improper removal of the fuse and the content acts on the goods.

It is usually difficult to wash off colors, rarely stink-spreading substances or artificial DNA . The merchant assumes that thieves do not have the necessary tools or skills to remove the backup. For this reason, this type of backup is not effective against professional thieves.