G07C9/00896

Automated Inventory System and Method of Use Thereof
20220383241 · 2022-12-01 ·

An improved automated inventory system is herein disclosed. The improved automated system (AIS) can comprise an enclosure for storing one or more items, one or more RFID readers, and a control system. Each of the items are tagged with an RFID (radio frequency identification) tag. The enclosure can comprise a plurality of of interior surfaces that defines an interior space within said enclosure. The enclosure can also comprise one or more access points within the interior surfaces that allow access to the items within the enclosure. Each of the RFID readers can be capable of reading the RFID tag. The control system can be in communication with the one or more RFID readers.

TCS, Tube Conveyor System of a purchase for drive-through pickup.
20220383434 · 2022-12-01 ·

A system and a method for online order and easy pickup comprising (1) a mobile application capable of interacting with customer to place and pay for the order, set up the time for pickup, generating order number and readable code associated with said order number, (2) a Tube Conveyor System (TCS) connecting the merchant's processing station to a kiosk. (3) said kiosk is located near the merchant facility for drive-through pickup using the order number and its associated readable code.

A system for drive through order and pickup comprising (i) at least one kiosk at a business facility capable of taking customer's order and process payment, (ii) a freely mobile capsule carrying the order, (iii) a Tube conveyor System capable of moving said capsule from the business process station to said kiosk

MERCHANDISE DISPLAY SECURITY SYSTEMS AND METHODS
20220381065 · 2022-12-01 ·

Security systems and methods are provided. In one example, a security system includes at least one lock configured to protect one or more items from theft from a fixture, and a strike plate configured to be mounted to the fixture. The lock comprises a plunger pin configured to be moved between a locked state when in engagement with the strike plate and an unlocked state when disengaged from the strike plate, and the lock comprises a cam configured to move the plunger pin between the locked state and the unlocked state. The lock is configured to be moved between a latched position and an unlatched position while the lock is in the unlocked state, the fixture configured to be accessed in the unlatched position, and the strike plate is configured to move relative to the lock to align the lock with the strike plate when the lock is moved from the unlatched position to the latched position.

MERCHANDISE DISPLAY SECURITY SYSTEMS AND METHODS
20220383714 · 2022-12-01 ·

Security systems and methods are provided. In one example, a security system includes at least one lock configured to protect one or more items from theft from the fixture, wherein the lock comprises a drive shaft configured to be moved between a latched position and an unlatched position, the fixture configured to be accessed in the unlatched position. The lock is configured to be moved between a locked state and an unlocked state for allowing the drive shaft to be moved between the latched position and the unlatched position when in the unlocked state, wherein the lock includes a cam sleeve having an internal cam surface configured to transition the lock between the locked state and the unlocked state in response to movement of the cam sleeve.

SMART LOCKER WITH ASSISTANCE FOR VISUALLY IMPAIRED USERS

A smart locker system with assistance for a visually impaired user is disclosed. Each locker in the smart locker system includes a beacon that emits a signal either before the locker door is released or at the same time as the locker door is released. The beacon is used by a visually impaired user to locate the specified locker before it opens or at the same time as it opens. The beacon may be a haptic device that causes the specified locker to vibrate, which allows the user to find the locker by feel. The beacon may also be an auditory device that causes the specified locker to emit a sound, which allows the user to find the locker by sound.

MERCHANDISE DISPLAY SECURITY SYSTEMS AND METHODS
20220381066 · 2022-12-01 ·

Security systems and methods are provided. In one example, a security system includes at least one lock configured to protect one or more items from theft from the fixture, wherein the lock comprises a plunger pin configured to be moved between a latched position and an unlatched position, and wherein the fixture is configured to be accessed in the unlatched position. The lock comprises a cam configured to be moved between a locked state and an unlocked state for allowing the plunger pin to be moved between the latched position and the unlatched position when in the unlocked state, wherein the cam is configured to be moved in response to receiving a wireless authorization signal to transition the lock between the locked state and the unlocked state.

ELECTRONIC DEVICE WITH LIGHT INDICATION FUNCTIONALITY
20220381427 · 2022-12-01 ·

An electronic device with light indication functionality is provided. The electronic device includes a device housing, a circuit board, a guiding ring and a plurality of light-absorbing elements. The device housing includes a housing recess and a supporting member, wherein the supporting member is formed as the bottom of the housing recess. The circuit board is disposed in the housing recess, wherein the circuit board includes a first circuit board surface and a plurality of first light sources, the first light sources are disposed on the first circuit board surface, and the first light sources provide first light beams. The guiding ring is disposed on the device housing. The light-absorbing elements are supported by the supporting member and correspond to the light-entering edge.

Authentication information control system, authentication information control method, and non-transitory computer-readable recording medium

A control unit issues temporary authentication information for disabling a locking/unlocking process to a user terminal satisfying a first condition. The control unit determines whether first authentication information has been issued to another user terminal, issues second authentication information to the user terminal to which the temporary authentication information has been issued when the first authentication information has not been issued to another user terminal, and issues the second authentication information to the user terminal to which the temporary authentication information has been issued with detection of ending of use of the first authentication information in another user terminal as a trigger when the first authentication information has been issued to the other user terminal.

Remotely controlled cabinet assembly
11512497 · 2022-11-29 ·

A remotely controlled cabinet assembly includes a cabinet unit that includes a central cabinet and a door that is hingedly coupled to the central cabinet. A plurality of locking units is each coupled to the central cabinet. Each of the locking units releasably engages the door for locking the door on the central cabinet. A control unit is coupled to the cabinet unit and the control unit is electrically coupled to each of the locking units. The control unit actuates each of the locking units to disengage and thusly unlock the door on the central cabinet. A keypad is coupled to the door and each of the locks disengages the door when an alpha-numeric code is entered into the keypad. An electronic device is carried by a user and the electronic device transmits an unlock command to the control unit for remotely unlocking the door on the central cabinet.

ENABLING REMOTE UNLOCK OF A LOCK
20220375288 · 2022-11-24 ·

It is provided a method for enabling remote unlock of a lock securing access to a physical space. The method is performed in a server and comprises the steps of: receiving, from a first mobile device, an access request to unlock a lock, wherein the request comprises an identifier of the lock and a user identifier associated with an access requester, being a user of the first mobile device; finding a remote credential device being associated with the lock; and transmitting an access request to the remote credential device, the access request comprising an identifier based on the user identifier.