RFID Technology: Securing Merchandise

RFID Technology: Securing Merchandise

RFID Technology is best and oldest way of securing merchandise is simply tethering or trapping. Today, mostly wire ropes are used for tying. The so-called Kensington lock is a common variant that is used both in sales rooms and by individuals. Some devices, for example laptops, have a special eyelet for securing with such a device. Especially for high quality, but small goods such as jewelry or electronics and transparent, oversized packaging used to prevent insertion into a bag. Often as a free service, the goods are repackaged at the cash register in a handy packaging but the technology today is taking over using anti-theft solutions, document tracking, Electronic Article Surveillance, Book detection etc.

Another common form is the presentation in a locked display case, from which the goods are brought from the seller. Cell phones, navigation devices or small MP3 players are often backed up with line protection against theft.

In this case, the object is secured, for example, by a USB plug, whereby an alarm is triggered when unauthorized removal of the cable. This supports, among other things, the open access to the object and promotes the desire to buy, because the affected object can be tested despite linen protection.

There are two strategies for attaching electronic article surveillance: The most common is a clearly visible attachment of a label, which can only be removed with special tools. The advantage is the psychological effect, since the customer perceives the goods as secure and casual thieves are deterred. Another variant is the hidden attachment to or in the goods. The backup will not be removed after purchase, but deactivated. The advantage is that a thief must know where to find the backup if he wants to remove it.

The future probably lies in the source tagging, that in the product already in the production / assembly a goods security label is integrated (eg in sales of shoes, sewing label in the suit, in the shank of the drill, under the label of the beverage bottle, etc. ). Source tagging is already being used successfully by several retailers (footwear, etc.), but the penetration rate in comparison to Spain or France is not that high in South Africa.

For this, the incorporated label must have the possibility that it can be activated, deactivated and reactivated. Thus, the goods can always be “made” active or inactive according to their goal.

A chemical security device does not prevent theft, but makes the goods unusable in the event of unauthorized removal or serves as proof of ownership later. For this purpose z. B. a chemical in a fragile container attached to the goods, so that this breaks when improper removal of the fuse and the content acts on the goods.

It is usually difficult to wash off colors, rarely stink-spreading substances or artificial DNA . The merchant assumes that thieves do not have the necessary tools or skills to remove the backup. For this reason, this type of backup is not effective against professional thieves.