Patent classifications
G08B13/22
Integrated, persistent security monitoring of electronic merchandise
An electronic device configured for retail display includes a persistent memory on which boot instructions are stored, a storage device on which security monitoring instructions are stored, and a processor configured to execute the boot instructions during a boot sequence to initiate execution of the security monitoring instructions. The processor is further configured, via the execution of the security monitoring instructions, to monitor the retail display of the electronic device for a security trigger event and, upon detection of the trigger event, lock a user interface of the electronic device.
Integrated, persistent security monitoring of electronic merchandise
An electronic device configured for retail display includes a persistent memory on which boot instructions are stored, a storage device on which security monitoring instructions are stored, and a processor configured to execute the boot instructions during a boot sequence to initiate execution of the security monitoring instructions. The processor is further configured, via the execution of the security monitoring instructions, to monitor the retail display of the electronic device for a security trigger event and, upon detection of the trigger event, lock a user interface of the electronic device.
System interaction with a movable barrier operator method and apparatus
A secure communication link is provided between a movable barrier operator and a peripheral system. Information conveyed via this link is used by one, the other, or both such elements to further inform or direct their respective actions.
System interaction with a movable barrier operator method and apparatus
A secure communication link is provided between a movable barrier operator and a peripheral system. Information conveyed via this link is used by one, the other, or both such elements to further inform or direct their respective actions.
SYSTEMS AND METHODS FOR IDENTIFYING POTENTIAL SHOPLIFTING INCIDENTS
Embodiments relate to systems and methods for identifying potential shoplifting incidents. In one embodiment, a system can receive and analyze information related to a number of items removed from a display and a number of items added to a shopping receptacle. These numbers of items can be detected by weight or load changes sensed by a sensor system, and if the counted numbers of items do not match, the system can flag nearby shopping receptacles via their unique identification numbers as potentially involved in shoplifting incidents.
Method and Apparatus for Tiered Analytics in a Multi-Sensor Environment
Disclosed is a networked system for detecting conditions at a physical premises. The networked system includes a local computer system configure to read a configuration file that determines processing performed by the local computer system and evaluate collected sensor data with respect to the configuration file, for first sensor data to be processed by the local computer, and execute unsupervised learning models to continually analyze the first sensor data to produce operational states and detect drift sequences that are correlated to stored determined conditions. The networked system also includes a remote computer system that execute unsupervised learning models to continually analyze the collected sensor information. An alert is asserted by at least one of the local computer and the remote computer based on the determined conditions.
Method and Apparatus for Tiered Analytics in a Multi-Sensor Environment
Disclosed is a networked system for detecting conditions at a physical premises. The networked system includes a local computer system configure to read a configuration file that determines processing performed by the local computer system and evaluate collected sensor data with respect to the configuration file, for first sensor data to be processed by the local computer, and execute unsupervised learning models to continually analyze the first sensor data to produce operational states and detect drift sequences that are correlated to stored determined conditions. The networked system also includes a remote computer system that execute unsupervised learning models to continually analyze the collected sensor information. An alert is asserted by at least one of the local computer and the remote computer based on the determined conditions.
Utilizing a high generation cellular network for identifying devices associated with unauthorized activities and notifying enterprise facilities
Aspects of the disclosure relate to utilizing a high generation cellular network for identifying devices associated with unauthorized activities and notifying enterprise facilities. A computing platform may collect device information for a plurality of user devices at a first location. Then, the computing platform may receive, from a first device at the first location, a message related to a first activity in a vicinity of the first location. Then, the computing platform may identify a sub-plurality of the plurality of user devices, wherein the sub-plurality of user devices are located at the first location at a time of occurrence of the first activity. Then, the computing platform may generate an alert notification comprising information related to the first activity and device information for the sub-plurality of user devices. Subsequently, the computing platform may send the alert notification to a collection of devices at a plurality of locations.
Utilizing a high generation cellular network for identifying devices associated with unauthorized activities and notifying enterprise facilities
Aspects of the disclosure relate to utilizing a high generation cellular network for identifying devices associated with unauthorized activities and notifying enterprise facilities. A computing platform may collect device information for a plurality of user devices at a first location. Then, the computing platform may receive, from a first device at the first location, a message related to a first activity in a vicinity of the first location. Then, the computing platform may identify a sub-plurality of the plurality of user devices, wherein the sub-plurality of user devices are located at the first location at a time of occurrence of the first activity. Then, the computing platform may generate an alert notification comprising information related to the first activity and device information for the sub-plurality of user devices. Subsequently, the computing platform may send the alert notification to a collection of devices at a plurality of locations.
SYSTEMS AND METHODS FOR THREAT MONITORING
The present invention is directed to systems and processes for monitoring threats in a defined monitoring zone including a server, a radio frequency transmitter positioning system, a position database. The radio frequency transmitter positioning system includes one or more radio frequency receivers and a location module configured to provide location of radio frequency transmitters within the defined monitoring zone. The position database is configured to store radio frequency transmitter fingerprint data and associated person information. The system is configured to determine threat risk by comparison of the stored radio frequency transmitter fingerprint data with the fingerprints of active radio frequency transmitter fingerprint data within the defined monitoring zone.