- 1- You can watch everyone in the store like a hawk and make sure they don't steal anything. You can do that using security guards and/or video survelliance systems.
- 2- You can make things hard to remove from the store by bolting them down, attaching cables, putting things in display cases and behind the counter.
- 3- You can use a system that attaches special tags onto everything so that an alarm goes off whenever a shoplifter tries to walk out with an item.
EAS Security is protection for your shop or retail chain and the word it self means Electronic Article Surveillance. An EAS Security system usually consists of EAS Antennas and EAS Tags or labels. These components signals to each other if they come too close.
Radio Frequency (RF) Systems
This processes the label response signal and will trigger an alarm when it matches specific criteria. The distance between the two gates, or pedestals, can be up to 80 inches wide. Operating frequencies for RF systems generally range from 2 to 10 MHz (millions of cycles per second); this has become standard in many countries. Most of the time, RF systems use a frequency sweep technique in order to deal with different label frequencies.
Sometimes both the transmitter and receiver are combined in one antenna frame -- these are called mono systems and they can apply pulse or continuous sweep techniques or a combination of both. According to Tag Point Ltd. experts, mono systems could be effective for you if your store's entry is small. The mono system is used with hard labels, which are slightly more expensive than paper labels used with RF sweep techniques.
Many access control systems use network for communication purpose and information is communicated through these networks.
Electromagnetic (EM) system
What most people refer to as an electromagnetic tag is actually a metal wire or ribbon that has high permeability, making it easy for magnetic signals to flow through it, according to Sensormatic's EAS Product Co. CTO Hap Patterson. "When we drive the tag, flux is being allowed to flow through the tag until it's saturated," he says. "When it's saturated, from a magnetic perspective, it begins to look like air. Saturation occurs abruptly and is an important part of the design of the tag."
Look at the figure showing the EM system with its receive coil and transmitter on either side and tag in the middle. When the tag goes from active to saturated, the receiver detects the change in the amount of the signal picked up from the transmitter. "If you look at the receiver signal, you'll see a bump when saturation occurs," Patterson says.
Saturation occurs twice each cycle-once on the transmitter's positive cycle and once on its negative cycle. What is happening is the system is checking for the special material used to make the tag. (In scientific terms, the permeability of steel is much lower than the metal used to make the tag. In addition, when steel goes to saturation, it tends to do so slowly, not abruptly. So the EM system uses these differences to differentiate between a still-active tagged item leaving the store and a wrench in someone's pocket.)
While the transmitter is off between pulses, the tag signal is detected by a receiver. A microcomputer checks the tag signal detected by the receiver to ensure it is at the right frequency, is time-synchronized to the transmitter, at the proper level and at the correct repetition rate. If all these criteria are met, the alarm occurs.
AM material is highly magnetostrictive, which means that when you put the tag material in a magnetic field, it physically shrinks. The higher the magnetic field strength the smaller the metal becomes. The metal actually shrinks about one-thousandth of an inch over its full 1.50 inch length.
As a result of driving the tag with a magnetic field, the tag is physically getting smaller and larger. So if it is driven at a mechanically resonant frequency, it works like a tuning fork, absorbing energy and beginning to ring.
This tag also requires bias magnet material in addition to active element material. The active material will shrink no matter which direction the magnetic field is placed upon it. If the tag is driven with Frequency, F, it gets smaller as the magnetic field increases and larger as it's driven towards zero.
This means that while it is being driven at F, the tag is trying to work at 2F, because at both positive and negative halves of the drive signal, the tag is getting smaller. To get the tag to work at F, a bias field is required. The bias is provided by a semi-hard magnetic element in the label. When magnetized, the bias prevents the active element from ever being in a zero field condition. So for an entire half of the drive signal, the tag shrinks. Then it expands for the other half. This results in an F response.
Desirable qualities in deactivators include a large deactivation zone and 100 percent deactivation with no false alarms. The type of electronic deactivator depends upon the kind of EAS system and tags used by the store. We're all familiar with hand-held scanners and flat scanner pads used to swipe and deactivate merchandise tags.
Traditionally, scanners must touch a label directly to use specific frequency to deactivate it. But with the growing use of source tagging (hiding identification tags somewhere on an item or in its packaging) proximity deactivators, or verifiers that don't require contact with a label, are becoming more important. There are also mass or bulk deactivators, which bring EAS labels from an inactive state to an active state while the products are still packaged in master cartons or cases.
Hard Tag Detachers
- Easily remove hard tags from protected merchandise at point of sale.
- Efficiently enhance checkout throughput and customer experience.
- In multiple designs and flexible installation options for nearly any retail environment.
- They are special instruments to open and remove hard tags.
Clothing Hand-Held Detacher is a manual unit designed to open AM58khz super tags, Tough moulded plastic makes the unit both durable and lightweight while an ambidextrous design accommodates both right-handed and left-handed users. The detacher provides a channel in the base of the handle that can be used to straighten bent tacks on hard tags.This AM magnetic alarm clothes detacher is easy to remove the hard tags from clothes.
The Super Designer Detacher has is one of the strongest EAS tag detachers in its class while at the same time retaining a sleek, polished look to blend in with your checkout environment. The magnet rating of this Detacher is 12000GS. The Super Designer Detacher will remove almost all RF tags including the Designer Tamper Resistant Tags.
Label Deactivators Machines
Stealth Pad is a compact label deactivator designed for minimal counter space. It is configured for tabletop operation but, can also be flush mounted to the countertop. It provides both audible and visual notification of deactivation. Stealth Pad provides up to 4" deactivation distance and has optional password protection. Stealth Pad is an excellent product for both source and retailer tagged merchandise.
Fast Pad provides human, machine interface for label deactivation and efficiency. It can be either tabletop or flush mounted to any countertop. Fast Pad provides up to 4" deactivation distance and password protection option.
Lynx is a distance label deactivator designed solely for flush mounting on the countertop. It scans and deactivates labels in all orientations. As a distance deactivator, the label need not come into direct contact with the deactivator; simply passing the product over Lynx, is all it takes! No buttons or lights means complete simplicity and ease of use for all employees. Lynx features up to 3.2" deactivation range.
The Double Checker Deactivator is so named because of its two-step testing for complete label deactivation. One swipe deactivates the label, a second swipe tests to confirm deactivation. It also features a terrific vertical detection range of up to 6 inches. This powerful tool can also deactivate labels source tagged on the inside of product packages.
Devices used to detect knives, weapons or explosives may vary based on method of detection or application. Some devices are suitable for screening people, while other technologies can only be used to search containers or vehicles. Security officers involved in the inspection process are responsible for preventing the introduction of hazardous materials into the area
Hand Held Metal Detectors
It is an alternative and complementary tool to fixed scanners, which bring more mobility and flexibility.
A single sweep scan on a subject's body or on a travel bag is sufficient to detect hidden metal objects.
With high sensitivity to all metals, your teams can easily detects weapons, metal objects, in all situations, in compliance with the latest security standards :
- Airports and boarding docks
- Festivals and music lines
- Door security at nightclubs
- Crowed indoors events
- Sporting events and stadia
- Educational and local institutions
Typical uses include body search for offensive weapons in crowd control, airport and border security, as well as checking parcels and letters for metal objects.
Maintain privacy while searching. During the search, it is recommended not to touch the person being searched with a handheld metal detector.
For more effective work with a metal detector to identify prohibited metal objects, it is necessary to conduct regular testing of personnel, measures to improve the skills and training of security personnel and law enforcement agencies.
- Handheld metal detector when scanning a person should be at a distance of 5-10 cm from the body.
Avoid touching the body or clothing of the person being searched with the metal detector. However, in some cases, when inspecting a person in outerwear (down jackets, jackets, coats, etc.), it is necessary to bring the metal detector to the body of the inspected person at a distance of less than 5 cm to ensure the best quality in detecting metal objects.
Hand Held RF Detectors
Walk Through Metal Detectors
Walk-through metal detectors utilize magnetic fields to detect metal that passes through them. The science behind how they work is based on Maxwell's equations. The latest detectors include multiple detection zones allowing them to pinpoint the location of the metal causing the alarm. They have been proven to be a safe and effective method for maintaining security.
When an electric pulse is sent through a coil of wire, it creates a magnetic field. When the field hits a metal object, it reflects back and can be detected using another coil of wire. The size and timing of the detected pulse is used to define the size and position of the object.
Did you find what you need?
If not, please let us know what you were trying to find. Feedback from you will help us improve our website.
Security saving tips
- You are a target to intruders
- Keep system up-to-date
- Place CCTV cameras to monitor hidden entry points
- Protect or hide your cables
- Connect Securely
- Back up your data
- Fast Callback and response
- Dedicate Help center
- Professional diagnose
- Delivery on time