G08B13/24

Detecting interactions with storage units based on RFID signals and auxiliary signals

Storage units including platforms that are outfitted with RFID antennas and auxiliary sensors detect changes in loading on the platforms based on changes in loading determined by the auxiliary sensors or changes in signals received by the RFID antennas. The platforms include surfaces for receiving items tagged with RFID transmitters thereon, such as items of common types and variable weights. An interaction involving the placement of an item on the platform, or the removal of the item from the platform, is detected by the auxiliary sensors. The energization of an RFID field is triggered in response to the detected interaction, and an item is identified where an RFID signal transmitted by the item is present at one time and absent at another time.

Sensor Arrangement

Disclosures relate to a sensor system and arrangements having different sized removable spacers. The spacers may be mixed and matched as needed or desired to compensate for misalignment conditions. Further, different spacer combinations and adjustments may be guided by a security management computing device. Variations in configurations of mounting surfaces, such as door and window assemblies, may be accommodated. Alignment of a transmitter or a receiving device, e.g., a magnetic device, with respect to a transmitter or receiving device despite misalignment of the components due to, for example, uneven surfaces of a door or a window, or a respective frame may be achieved.

SYSTEM FOR MONITORING AND CONTROLLING SHOPPING CART USAGE
20230057163 · 2023-02-23 ·

A system for monitoring and controlling shopping cart usage comprises a wheel assembly that attaches to a shopping cart. In some embodiments the wheel assembly includes a wheel, a brake that can be activated to inhibit rotation of the wheel, a controller that controls the brake, a VLF receiver, and an RF transceiver. The RF transceiver may, for example, operate in a 2.4 GHz frequency band. In some implementations, the RF transceiver may be used to detect entry of the shopping cart into a checkout area of the store, and the VLF receiver may be used to detect that the shopping cart is exiting the store. The controller may activate the brake if the shopping cart attempts to exit the store without first passing through a checkout area.

SYSTEM AND METHOD FOR DETECTING A PRESENCE IN A CLOSED ENVIRONMENT TO BE MONITORED, FOR ANTI-INTRUSION OR ANTI-THEFT PURPOSE

A system for detecting a presence in an environment to be monitored includes an electrostatic charge variation sensor, a vibration sensor, and an environmental pressure sensor. A processing unit is configured to acquire, from the electrostatic charge variation sensor, an electrostatic charge variation signal, and detect in the electrostatic charge variation signal, first signal characteristics indicative of the presence of a subject in the environment to be monitored. The processing unit further validates the detection of presence of the subject using the vibration and pressure signals provided by the other sensors.

SYSTEM AND METHOD FOR DETECTING A PRESENCE IN A CLOSED ENVIRONMENT TO BE MONITORED, FOR ANTI-INTRUSION OR ANTI-THEFT PURPOSE

A system for detecting a presence in an environment to be monitored includes an electrostatic charge variation sensor, a vibration sensor, and an environmental pressure sensor. A processing unit is configured to acquire, from the electrostatic charge variation sensor, an electrostatic charge variation signal, and detect in the electrostatic charge variation signal, first signal characteristics indicative of the presence of a subject in the environment to be monitored. The processing unit further validates the detection of presence of the subject using the vibration and pressure signals provided by the other sensors.

Tracking movement of an item

A method and associated system for managing an item in a place. Positional information about an operating object and positional information about the item is monitored at regular intervals by a receiver receiving locational coordinates of a tag associated with the item and a tag carried by the operating object. Based on the positional information, it is detected i) that the item in the place is being moved, (ii) that the operating object inside the place is moving, (iii) a distance between the location of the operating object and the item, and (iv) that the operating object inside the place and the item in the place are within a previously specified distance of each other. After the previous detections, it is determined that the operating object has illegitimately taken the item, which triggers preventing the operating object from removing the item from the place.

Method of managing an output power delivered by an antenna of a NFC apparatus and NFC apparatus

In an embodiment, a method of managing an output power delivered by an antenna of a NFC apparatus includes: providing a matching circuit with a first tuning capacitive network coupled in series between a NFC controller and the antenna and with a second tuning capacitive network coupled to the NFC controller and the antenna and to a reference terminal, wherein the first or second tuning capacitive network has a variable capacitive value; determining tuning capacitive values of the first tuning capacitive networks to adjust a delivered output power at a desired level; and setting the tuning capacitive values of the first tuning capacitive network to the tuning capacitive values.

Multiple-factor verification for vision-based systems
11501537 · 2022-11-15 · ·

A system and method for interaction monitoring in a retail environment that includes executing a first monitoring system and thereby generating a first evaluation of customer selection of items; executing a second monitoring system and thereby generating a second evaluation of customer selection of items; determining monitoring alignment between the first evaluation and the second evaluation of a first customer; and triggering an action in response to the monitoring alignment.

NEAR-FAR SECURITY SENSOR
20230051790 · 2023-02-16 ·

Described is a security sensor comprising two or more sub-sensors for use in a variety of installations where different magnetic fields may be experienced by the security sensor as a result of the variety of installations. One of the sub-sensors may have a low magnetic sensitivity while the other sub-sensor may have a much higher sensitivity to magnetic fields. In operation, one or both sub-sensors are used to determine if a door or a window has been opened.

MOBILE DEVICE CASE FOR SECURED ACCESS AND IMPROVEMENTS
20230052605 · 2023-02-16 ·

Mobile device cases are provided which, in a first embodiment, selectively limit a user's ability to control the user's own mobile electronic device. The case includes front and rear portions joined together and defining therein an opening for receiving a mobile electronic device, such as a mobile phone. A locking mechanism is provided for selectively securing the opening in a first locked position to prevent operational access to the mobile electronic device by the user until a predetermined condition is met. The case includes an indicia of time visible to the user during the period of time of prevented operational access. In a further embodiment, a case is provided with first and second polymeric shells each having an interior and an exterior surface thereon and connected together by at least one hinge portion. The first and second shell portions form a cavity of sufficient size to cover a mobile electronic device sufficiently to prevent access by its user. Tamper resistant and ultrasonic sensor defeating mobile device case embodiments are also contemplated by this invention.