Patent classifications
G08B13/24
SECURING A SECURITY TAG INTO AN ARTICLE
A method for securing a security tag into an article of clothing includes positioning an end of the security tag into a first opening to an interface space between two layers of the article of clothing. The two layers are fixedly connected by one or more opposing connectors that are spaced apart in a manner to form the interface space sized to receive the security tag. The security tag is fully moved into the interface space. Also described herein is a security tag specially configured for placement into the interface space between two layers of the article of clothing.
SYSTEMS AND METHODS FOR POSITIONING ASSETS OVER A WIRELESS NETWORK
Systems and methods for positioning assets over a wireless network are provided. In one embodiment, the method comprises scheduling, at a scheduling entity communicatively coupled to the wireless network, a ranging time to execute a plurality of ranging events between a participating tag associated with a designated asset and selected from a plurality of tags, and each participating anchor of a plurality of participating anchors selected from the plurality of anchors; sending, from the scheduling entity, to the participating tag and to each participating anchor, a corresponding ranging message comprising the ranging time for each ranging event and a list identifying said participating tag and said each of the participating anchors; executing at the ranging time, each ranging event of the plurality of ranging events to produce a corresponding ranging information; and calculating, at a positioning engine a position of said participating tag and said designated asset.
Radio frequency identification (RFID) tag location verification using short range communication
An EAS system first transmits, over a time, a radio frequency identification (RFID) interrogation signal into an RFID interrogation zone of an EAS system. The system then first receives at least one RFID response signal from a first RFID tag of the system responding to the interrogation signal. The system second transmits, over a second time overlapping at least in part with the first time, a non-RFID RF signal into a second zone. The second zone and the RFID interrogation zone overlap to form a zone of interest. The system second receives, from the first RFID tag, an indication that the first RFID tag received the second transmission. The system determines, based on receiving both the RFID response signal from a first RFID tag and the indication that the first RFID tag received the second transmission, that the first RFID tag is in the zone of interest.
Methods and apparatuses for determining frequency response of a security tag
Aspects of the present disclosure include methods, systems, and non-transitory computer readable media for transmitting at least one incident radio frequency identification (RFID) signal to a RFID tag attached to a merchandize item, receiving at least one reflected RFID signal from the RFID tag, determining a frequency response of the RFID tag based on the at least one reflected RFID signal, comparing the frequency response to a plurality of baseline frequency responses, and determining a state of the RFID tag based on the comparing.
Cable alarm tag
The present invention provides an improved cable that includes at least one insulated conductor insulated from and within and inside a insulated second conductor, with both conductors connected with both ends with a cable alarm tag to form a closed electrical circuit, with the loop of the cable connected to an article for securing the article. With the cable of the present invention, if severed, the use of jumper cables will maintain the electrical circuit loop closed for the outer conductor only, but not the insulated inner conductor that is within and inside the outer conductor. Therefore, when severing the cable to disconnect and discontinue the physical loop to remove the secured article, even if cable jumpers are used, the insulated inner conductor will remain open circuited when the cable is cut, resulting in trigger of the alarm.
Sensing Device for Access Point
A method of operating a sensing component for sensing a magnetic field to determine a state of an access point having a first component and a second component that are separable from each other to create an opening and wherein a magnet is mounted on one of the first or second components of the access point, wherein the method comprises: operating the sensing component to sense a magnetic field in multiple dimensions to produce a sample representation of the sensed magnetic field, wherein the sample representation is a multi-dimensional representation and determining whether the sample representation is in a pre-determined region about a reference representation that is representative of a state of an access point to determine that the sensed magnetic field corresponds to said state of the access point, wherein the pre-determined region comprises a circular cross-section.
Security devices for products
A security device for protecting objects from theft or unauthorized removal includes a first component configured to be fixed to an object and a second component configured to be removably secured to the first component. The second component includes an alarming mechanism configured to be armed prior to the second component being secured to the first component. The alarming mechanism may include one or more actuating mechanisms that actuate the alarming mechanism. In certain embodiments the second component is configured to slidably engage the first component. In other embodiments, the security device further includes a cable having an end attached to the first component or the second component.
Asset Management Techniques
Systems, devices and methods for monitoring and managing parts, enterprise resources and other assets, and alleviating risks, in a complex collaboration environment are provided. According to some example aspects of the invention, a device with a hardware- and software-based control system scans and/or writes unique asset-related information within a plurality of chemical, electromagnetic, or written data-bearing tags within, on or throughout an asset for use in a manufacturing, maintenance and/or tracking process. In other example aspects, the system records that asset-specific information (e.g., using secure network(s) and/or a blockchain), providing it for later access and modification by a number of trusted users, to track and control manufacturing-, maintenance-relevant or other factors. In still other example aspects, an enterprise resource planning system both outputs information to, and receives information from, the control system, reconciling changes in the data.
Intrusion detector and method for improved sensitivity
A motion detector includes a microwave-based module to detect movement. Intermediate processing circuitry is coupled to an output from the module. The processing circuitry is activated intermittently to produce first and second pulsed output signals. Cross-correlation circuitry processes the two signals to produce a motion indicating output signal.
Underwater container cooling via external heat exchanger
In one example, a shell includes walls that collectively define an interior space of the shell, the interior space sized and configured to receive heat generating equipment. An internal heat exchanger disposed within the interior space is arranged for thermal communication with heat generating equipment when heat generating equipment is located in the interior space. Additionally, an external heat exchanger is located outside of the shell and arranged for fluid communication with the internal heat exchanger. Finally, a prime mover is provided that is in fluid communication with the internal heat exchanger and the external heat exchanger, and the prime mover is operable to circulate a flow of coolant through the internal heat exchanger and the external heat exchanger.