G08B13/06

Secure passive RFID tag with seal

A secure passive RFID tag system comprises at least one base station and at least one passive RFID tag. The tag includes a fiber optic cable with the cable ends sealed within the tag and the middle portion forming an external loop. The loop may be secured to at least portions of an object. The tag transmits and receives an optical signal through the fiber optic cable, and the cable is configured to be damaged or broken in response to removal or tampering attempts, wherein the optical signal is significantly altered if the cable is damaged or broken. The tag transmits the optical signal in response to receiving a radio signal from the base station and compares the transmitted optical signal to the received optical signal. If the transmitted optical signal and the received optical signal are identical, the tag transmits an affirmative radio signal to the base station.

Alarming security device and method comprising an electronic article surveillance tag and tamper detection circuitry

A security device is provided that includes an electronic article surveillance tag that may be configured to resonate to provide a wireless response signal to a deactivator to trigger generation of a deactivation field. Further, the security device may include tamper detection circuitry which may include a tamper sensor configured to generate a tamper signal in response to detecting a tamper event, a deactivation sensor configured to generate a deactivation signal in response to detecting the deactivation field, and a sounder. In this regard, the tamper detection circuitry may be configured to deactivate the tamper detection circuitry in response to receiving the deactivation signal from the deactivation sensor such that receipt of the tamper signal after deactivation of the tamper detection circuitry does not trigger the sounder to emit the alarm.

Alarming security device and method comprising an electronic article surveillance tag and tamper detection circuitry

A security device is provided that includes an electronic article surveillance tag that may be configured to resonate to provide a wireless response signal to a deactivator to trigger generation of a deactivation field. Further, the security device may include tamper detection circuitry which may include a tamper sensor configured to generate a tamper signal in response to detecting a tamper event, a deactivation sensor configured to generate a deactivation signal in response to detecting the deactivation field, and a sounder. In this regard, the tamper detection circuitry may be configured to deactivate the tamper detection circuitry in response to receiving the deactivation signal from the deactivation sensor such that receipt of the tamper signal after deactivation of the tamper detection circuitry does not trigger the sounder to emit the alarm.

Control system providing a real-time remote alarm
09761105 · 2017-09-12 ·

A control system includes a control module (34), a control device (20) mounted to a door (12) and controllable by the control module (34), and a manager mobile device (54) operable to connect with the control module (34) to obtain management authority to access to the door (12). The control device (20) includes a latch (24) for retaining the door (12) in a closed position. A vibration detecting unit (66) is mounted to the door (12) or the control device (20) and is electrically connected to the control module (34). When the vibration detecting unit (66) detects vibrations of the door (12) or the control device (20), the manager mobile device (54) is activated, and the image of the outside of the door (12) is transmitted to the manager mobile device (54), such that the manager can immediately know the situation outside the door (12).

TAMPER ALARM FOR ELECTRONIC LOCK
20220228399 · 2022-07-21 ·

An electronic lock includes a latch assembly that includes a bolt that is movable between an extended position and a retracted position. The electronic lock includes a keypad for receiving a keypad input event. The electronic lock includes a processing unit being configured to control the movement of the bolt between the extended position and the retracted position responsive to receiving a valid keypad input event. The processing unit is configured to capture the keypad input event. Based at least in part on a characteristic of the keypad input event, the processing unit indicates if a tampering event exists. The characteristic includes at least one of an input location on the keypad, an input duration on the keypad, and an input timestamp.

TAMPER ALARM FOR ELECTRONIC LOCK
20220228399 · 2022-07-21 ·

An electronic lock includes a latch assembly that includes a bolt that is movable between an extended position and a retracted position. The electronic lock includes a keypad for receiving a keypad input event. The electronic lock includes a processing unit being configured to control the movement of the bolt between the extended position and the retracted position responsive to receiving a valid keypad input event. The processing unit is configured to capture the keypad input event. Based at least in part on a characteristic of the keypad input event, the processing unit indicates if a tampering event exists. The characteristic includes at least one of an input location on the keypad, an input duration on the keypad, and an input timestamp.

Porch piracy parcel theft prevention system and method
11202526 · 2021-12-21 ·

A porch piracy parcel theft prevention system and method includes a delivery location apparatus configured for adaption to a building to receive a parcel, the delivery location apparatus including a sensor and a parcel locking mechanism. The sensor is configured to detect the presence of a delivered parcel placed into the line of sight of the parcel detecting sensor. The parcel locking mechanism is armed upon entry of a carrier code and disarmed upon entry of a user code. When armed, the parcel locking mechanism is configured to trigger an alarm when the parcel detected locking mechanism detects removal of the parcel from the line of sight of the parcel detecting sensor. When disarmed, the package may be removed from the line of sight of the parcel detecting sensor without tripping the alarm. Among other uses, helps prevent parcel theft from single family dwellings.

Porch piracy parcel theft prevention system and method
11202526 · 2021-12-21 ·

A porch piracy parcel theft prevention system and method includes a delivery location apparatus configured for adaption to a building to receive a parcel, the delivery location apparatus including a sensor and a parcel locking mechanism. The sensor is configured to detect the presence of a delivered parcel placed into the line of sight of the parcel detecting sensor. The parcel locking mechanism is armed upon entry of a carrier code and disarmed upon entry of a user code. When armed, the parcel locking mechanism is configured to trigger an alarm when the parcel detected locking mechanism detects removal of the parcel from the line of sight of the parcel detecting sensor. When disarmed, the package may be removed from the line of sight of the parcel detecting sensor without tripping the alarm. Among other uses, helps prevent parcel theft from single family dwellings.

CLASSIFYING VIBRATIONS

It is provided a method for classifying vibrations detected in a structure of a building. The method is performed in a vibration classifier and comprising the steps of: determining a measurement period of a vibration signal; splitting the measurement period in a plurality of sequential sub-periods; calculating, for each one of the sub-periods, a variation indicator of at least one component of the vibration signal; and classifying a source of the vibration signal based on the variation indicators.

Gateway-based anti-theft security system and method

Improved systems and techniques are disclosed for controlling the security states of anti-theft security systems such as product display assemblies using security fobs. The tasks relating to fob authentication are offloaded to a computer system, and these authentications can be based on identifiers for the different security fobs. The computer system can maintain a list of identifiers for authorized security fobs that is easily updated when new security fobs are added to or existing security fobs are de-authorized from the system.