G08B13/24

SECURITY TAG
20220406156 · 2022-12-22 · ·

This invention relates to security tags for use in a retail environment. In particular, this invention relates to security tags that may be attached to an item and may be used to suspend or hang the item in a retail display. A security tag for attachment to an object comprises a main body including an electronic article surveillance (EAS) sensor and a first aperture; a retainer including a second aperture, the retainer being connected to the main body and being moveable between a first position and a second position relative to the main body; and a securing mechanism comprising a first part provided on the main body and a second part provided on the retainer. In the first position the securing mechanism is not engaged and an object is insertable between the main body and the retainer, and in the second position the securing mechanism is engaged to retain the retainer in the second position and the first aperture is aligned with the second aperture. The EAS sensor is configured to be deactivated.

Two-alarm shoe tag

Disclosed is a two-alarm security device that will alarm if the security device is forcibly removed from an article or item without detachment by a corresponding detachment device, and the security device will cause the pedestals in a store to alarm if the article or item is passed through the pedestals with the device still attached. The two-alarm security device comprises a slider operatively movable along a stop piece and a spring-biased engagement member that is operatively moveable into the housing of the stop piece. As the slider and engagement member move from an open position to a closed position, the security device alarm is actuated. A pressure pad attached to the engagement member assists in gently, but sufficiently securing an article between the slider and engagement member. If the article is improperly removed from the security device or otherwise tampered with, the spring-biased engagement member will cause a micro-switch to alarm.

Modification of Trigger Thresholds of RFID Devices in an Electronic Article Surveillance System
20220398909 · 2022-12-15 ·

Electronic surveillance article systems reducing the number and likelihood of false alarms are provided. Such systems include two read zones, with a second read zone having an associated RFID reader configured to detect an RFID device at a trigger threshold. The trigger threshold may be set or modified in view of a value of a sensor of an RFID device (sensing a capacitance or dielectric permittivity or temperature or degree of movement, for example), the number of times the RFID device is detected in the first read zone, or whether the RFID device is detected in the first read zone under predetermined conditions. Such systems may also or alternatively initiate a response (e.g., modifying the trigger threshold or the amount of power transmitted by an RFID reader) when an RFID guard device associated with a piece of infrastructure in the first read zone is detected in the second read zone.

Dual hard tag
11527138 · 2022-12-13 · ·

A dual hard tag assembly comprises radio frequency identification and electronic article surveillance. The dual hard tag is provides a single component able to both track retail merchandise generally and prevent theft by triggering an alarm. The RFID and EAS systems are not coplanar. The dual hard tag system is small and light weight, and may be reprogrammed and reused for the tracking and anti-theft of multiple items.

Detecting falls using a mobile device

In an example method, a mobile device obtains sample data generated by one or more sensors over a period of time, where the one or more sensors are worn by a user. The mobile device determines that the user has fallen based on the sample data, and determines, based on the sample data, a severity of an injury suffered by the user. The mobile device generates one or more notifications based on the determination that the user has fallen and the determined severity of the injury.

Methods and apparatuses for removing a security tag

Aspects of the present disclosure include methods, systems, and non-transitory computer readable media for receiving a confirmation signal to unlock the security tag being detachably locked to a merchandise, wherein the confirmation signal includes a RFID device identifier associated with a RFID device of the security tag, and the RFID device is associated with a wireless device of the security tag, identifying the wireless device associated with the RFID device based on the RFID device identifier, transmitting a wireless signal to the wireless device to enable a controller to receive a release signal used to unlock the security tag from the merchandise, and transmitting the release signal to the controller to unlock the security tag from the merchandise.

Adaptive video content display using EAS pedestals or similar structure

Adaptive system for communicating with a customer in a retail store environment includes a sensor disposed at a sensor location in a retail environment. The sensor location is selected so that the sensor captures information that facilitates identification of at least one trait associated with a customer located proximate to the sensor location. A processing system is configured to use the information to determine the at least one trait. Thereafter, in response to such determination, the processing system selectively determines a message or content selection to be displayed to the customer based at least in part on the at least one trait that has been identified.

Mobile device case for secured access and improvements
11520942 · 2022-12-06 · ·

Mobile device cases are provided which, in a first embodiment, selectively limit a user's ability to control the user's own mobile electronic device. The case includes front and rear portions joined together and defining therein an opening for receiving a mobile electronic device, such as a mobile phone. A locking mechanism is provided for selectively securing the opening in a first locked position to prevent operational access to the mobile electronic device by the user until a predetermined condition is met. The case includes an indicia of time visible to the user during the period of time of prevented operational access. In a further embodiment, a case is provided with first and second polymeric shells each having an interior and an exterior surface thereon and connected together by at least one hinge portion. The first and second shell portions form a cavity of sufficient size to cover a mobile electronic device sufficiently to prevent access by its user. Tamper resistant and ultrasonic sensor defeating mobile device case embodiments are also contemplated by this invention.

Systems and methods for increasing alarm confidence in EAS detection systems

Systems and methods for operating an EAS detection system. The methods comprise: detecting an Active Security Tag (“AST”) in an EAS detection zone; determining whether AST is coupled to an object identified in a list; and performing operations when a determination is made that AST is coupled to a listed object. The operations involve: accessing sensor data generated by at least one sensor device disposed on/near display equipment associated with the listed object; processing the sensor data to determine whether a person was within a defined distance range of AST during a period of time immediately preceding the detecting; concluding that a false alarm scenario exists when the sensor data indicates that a person was not within the defined distance range of AST during the period of time; and suppressing alarm issuance by the EAS detection system in response to the false alarm scenario conclusion.

Systems and methods for spatial sensing and tracking of objects in a space
11514765 · 2022-11-29 · ·

This disclosure is directed to product displays systems. In one aspect, a product display system includes three or more bases spatially distributed in a space. Each base has a wireless transceiver. The system includes a product display assembly comprising a puck assembly and a base assembly. The puck assembly has a surface on which a product is mountable for merchandising of the product to a customer and is untethered to the base assembly. The puck assembly executes machine-readable instructions that determines a coordinate location of the puck assembly within the space based on wireless communications between the puck assembly and the three or more bases. The puck assembly may also generate an alarm sound when the coordinate location is located within an alarm zone or a warning zone of the space.