G06K19/07

Operations system for combining independent product monitoring systems to automatically manage product inventory and product pricing and automate store processes

In some implementations, a device may receive data identifying products and encoded data identifying smart tags of the products. The device may map the data and the encoded data to generate encoded product data. The device may receive encoded data provided by smart tags of products received by a store. The device may receive images of the products. The device may compare the encoded data and the encoded product data to identify a set of the products received by the store. The device may correlate the images with the set of the products. The device may process the correlated data to identify locations of the set of the products in the store. The device may generate an instruction to relocate a product to a new location and may provide the instruction to a device, associated with the store, to cause the product to be relocated to the new location.

Safety device and method to prevent use of the same device if faulty
11557905 · 2023-01-17 · ·

The present invention discloses a safety devices adapted to prevent workers from going into hazardous environment, such as underground using the faulty safety device. As a safety device, typically embodied as a cap lamp, must be charged prior to each use, the device is adapted to detect when the device is removed from the charger. The device starts to blink continuously when disconnected from the charger. An automated test procedure is completed on the device. The user may also complete a manual portion of the test procedure to make the device usable. When the test procedure is completed successfully, the lamp stops blinking. If the test procedure is not successful, the lamp continues blinking to effectively prevent user from using a faulty device.

System and method for deterring theft

A theft deterring system includes a power tool with a motor connectable to a power source, a switch connected to the motor, a controller controlling to the switch for controlling an amount of power provided to the motor, and a state circuit having a memory for storing a state value. The controller activates the switch to provide power to the motor when the state value stored in the memory equals a desired value. The system may also include a tag programmer for changing the stored value.

Location-based asset usage control
11558744 · 2023-01-17 · ·

A lighting device includes a light source configured to emit a light and a sensor configured to receive identification information from an asset tag of a physical asset. The lighting device further includes a processor configured to send the identification information received from the asset tag and location information of the lighting device to a control device. The processor is further configured to receive a usage control message from the control device and transmit the usage control message, where the usage control message controls whether the physical asset is used at a location indicated by the location information.

Contactless card personal identification system

A dual-factor PIN based authentication system and method uses a cryptogram provided by a contactless card associated with the client in association with a PIN stored by the contactless card to authenticate the client. In some embodiments, cryptogram authentication may be preconditioned upon a PIN match determination by the contactless card. In other embodiments, the cryptogram may be formed at least in part using the personal identification number (PIN) stored on the contactless card encoded using a dynamic key stored by the contactless card and uniquely associated with the client. Authentication may be achieved by comparing the cryptogram formed using the PIN against an expected cryptogram generated an expected PIN and an expected dynamic key.

Surgical item managing method and surgical item managing system for smart operating room
11551811 · 2023-01-10 · ·

A surgical item managing method for use in a smart operating room to manage a surgical item used during a surgical procedure is provided. The surgical item includes a flexible RFID tag. The method includes the steps of: obtaining an information about a position of the flexible RFID tag; photographing a patient to obtain a position of the patient; determining if the position of the flexible RFID tag and the position of the patient overlap, to determine if the position of the flexible RFID tag is in the body of the patient; and giving a warning when the position of the flexible RFID tag is in the body of the patient.

Radio-frequency identification (RFID) tags for liquid monitoring

Example embodiments relate to radio-frequency identification (RFID) tags for liquid monitoring. An example RFID tag includes an antenna configured to communicate with an RFID reader. The antenna includes a radiating plane. The antenna also includes a ground plane. The RFID tag is attachable to a container. A reactance associated with the antenna is modifiable based on a temperature and a volume of a liquid within the container and adjacent to the ground plane. The RFID tag also includes an integrated circuit that includes a memory. The integrated circuit is configured to modulate the antenna in response to an RFID signal from the RFID reader based on the reactance associated with the antenna.

Tag Element System for User Content
20230042209 · 2023-02-09 ·

The Tag Element System allows users to create, upload, and share virtual content in the physical world utilizing the Tag Element System platform, “Enhanced Tag Elements”, and a smart device such as a smartphone or tablet. Any user can record a video or create other content and attach it to an Enhanced Tag Element simply by scanning or otherwise interacting with it with their smart device. The system provides a user interface to enable a user to create and upload new content upload previously stored content to the Tag Element System. Once content is uploaded, the user can share the Enhanced Tag Element with another user to allow that user to access, modify, and/or interact with the content.

Inmate compliance monitor

The disclosure relates to systems and methods for compliance monitoring in a secure facility. A method can include generating, by a mobile radio frequency identification (RFID) device, data regarding a proximate stationary RFID device of stationary RFID devices situated about a correctional facility, the mobile RFID device associated with a user, and comparing, by a server, the generated data to compliance monitoring rules that govern actions to be performed by the personnel in monitoring offender behavior, each of the compliance monitoring rules including an associated timeframe in which an action of the compliance monitoring rule is to be performed, and generating, by the server, an alert to be provided to the mobile RFID device in response to determining a time associated with a compliance monitoring action has already expired or will expire in a specified amount of time.

System, server and method for predicting adverse events
11593606 · 2023-02-28 · ·

A system includes a data collection engine, a plurality of items including radio-frequency identification chips, a plurality of third party data and insight sources, a plurality of interfaces, client devices, a server and method thereof for preventing suicide. The server includes trained machine learning models, business logic and attributes of a plurality of patient events. The data collection engine sends attributes of new patient events to the server. The server can predict an adverse event risk of the new patient events based upon the attributes of the new patient events utilizing the trained machine learning models.