Patent classifications
G08B13/1409
MERCHANDISE SECURITY SYSTEM INCLUDING RETRACTABLE ALARMING POWER CORD
A merchandise security system for an electronic item of merchandise is provided. In one example, the merchandise security system includes a continuous alarming power cord comprising at least one electrical conductor. The alarming power cord has a first end adapted to be electrically connected to the electronic item of merchandise and a second end. The merchandise security system also includes a reel for receiving the second end of the alarming power cord and adapted for storing at least a portion of the alarming power cord thereon. In addition, the merchandise security system includes monitoring circuitry in electrical communication with the alarming power cord and configured to detect an interruption in an electrical signal provided to the alarming power cord.
Anti-removal monitoring circuitry, electronic tag, anti-theft system and anti-theft method
The present disclosure provides an anti-removal monitoring circuitry, applied to an electronic tag. The circuitry includes a first input terminal, a second input terminal and an output terminal. The circuitry further includes: a shutdown circuit, configured to control the electronic tag to be in a shutdown state in response to connection between the first input terminal and the second input terminal; and a starting-up circuit, configured to control the output terminal to output a pulse voltage signal in response to disconnection between the first input terminal and the second input terminal, in such a manner that the electronic tag generates an alarm signal in response to the pulse voltage signal.
Security/tether cable
A power/security cord for use in a retail display includes the combination of at least one spring steel strand and at least one conductor coiled into the shape of a curly-Q cord. The steel strand provides a physical barrier against cutting the cord. The conductor provides wiring for power.
Facility device management system with smart power cords
A system that uses smart power cords with integrated sensors and wireless interfaces to manage devices in a facility such as a hotel. Each cord may monitor power delivered to an attached device, and may measure variables such as temperature, humidity, and pressure. It may also act as a gateway to other devices in the vicinity. A central control station may manage the devices in the facility via the smart power cords. Data collected from smart power cords may be analyzed to provide alerts and management reports. Illustrative alerts may warn of attempted theft when a device is unplugged, of environmental conditions that suggest mold risks or HVAC problems, or of a staff member requesting assistance via an emergency alert forwarded through a smart power cord. Locations of smart power cords may be automatically configured using either cooperative or non-cooperative localization based on measurement of signal characteristics such as RSSI.
Anti-theft doorbell camera
In some embodiments, security and/or automation systems, collectively referred to as automation system, may provide deterrents to the illicit acquisition of a device unique to the automation system. The system may enable a device to self-detect when the device is either stolen and/or the potential victim of hacking. The automation system may implement several solutions to help prevent tampering with its devices. The solutions may help prevent the physical acquisition of a device or may aid in the recovery of the device. The solutions may additionally include programming the device to automatically detect when the device is being hacked and/or misappropriated.
Electrically isolated heat dissipating junction box
A junction box used for making electrical connections to a photovoltaic panel. The junction box has two chambers including a first chamber and a second chamber and a wall common to and separating both chambers. The wall may be adapted to have an electrical connection therethrough. The two lids are adapted to seal respectively the two chambers. The two lids are on opposite sides of the junction box relative to the photovoltaic panel. The two lids may be attachable using different sealing processes to a different level of hermeticity. The first chamber may be adapted to receive a circuit board for electrical power conversion. The junction box may include supports for mounting a printed circuit board in the first chamber. The second chamber is configured for electrical connection to the photovoltaic panel. A metal heat sink may be bonded inside the first chamber.
Touch-Type Control System, Control Device and Monitor Device for Merchandise Security
The present invention provides a touch-type control system, a control device and a monitor device for merchandise security, including a controller and a monitor device, where the monitor device has an identifiable communication interface capable of communicating with the controller, and is configured to communicate with the controller via the identifiable communication interface and be initialized by a controller in communication therewith. The controller further comprises a touch-type communication interface for communicating with the monitor device, and is configured to be capable of controlling the monitor device initialized by the controller via the touch-type communication interface. In the system, the controller can communicate with the monitor device by means of a touch manner, thereby identifying, controlling and powering the monitor device, thereby solving the problem of the unification of power supply and data in the system.
Grading Control System and Control Device for Merchandise Security
The invention provides a grading control system and a control device for merchandise security, including at least two controllers and a plurality of monitor devices, wherein the controller comprises at least one main controller and at least one auxiliary controller. The monitor device has an identifiable communication interface that is capable of communicating with the controller, and is configured to be communicable with the controller via the identifiable communication interface, and to be initialized by the controller in communication therewith. The monitor device initialized by the auxiliary controller can be controlled by the main controller and the auxiliary controller. In this system, the controller can control the monitor devices within a set range according to the different privilege/level settings, respectively. The range controlled by the controller in the same system may be divided into different grades of control, realizing the control of grading and sub-regions and reflecting grading management.
RECOILER FOR A MERCHANDISE SECURITY SYSTEM
Embodiments of the present invention are directed to recoilers, merchandise security systems, and methods for displaying and protecting an article of merchandise from theft. In one example, the merchandise security system includes a sensor configured to be secured to the article of merchandise and a base for removably supporting the sensor and the item of merchandise thereon. The system also includes a recoiler operably coupled to the sensor. The recoiler includes a rotatable member defining a helical recess. The system further includes a cable configured to connect to the sensor and to be unwound from and wound on the rotatable member as the cable is extended and retracted. The cable is configured to be extended from the recoiler in response to the sensor being lifted off of the base, and the cable is configured to be retracted into the recoiler in response to the sensor being moved to a seated position on the base. The helical recess is configured to at least partially receive the cable therein as the cable is wound on the rotatable member.
METHOD AND APPARATUS FOR PROTECTING DATA IN A PORTABLE ELECTRONIC DEVICE
Data in a portable electronic device is protected by using external and internal status detection means to determine if the device is misplaced, lost, or stolen. The device then takes, singly or in combination, one of several actions to protect the data on the device, including declaring its location to an owner or service provider, locking the device or specific functions of the device to disable all data retrieval functionality, erasing or overwriting all the stored data in the device or, where the data has been stored in the device in an encrypted format, destroying an internally-stored encryption key, thereby preventing unauthorized access to the encrypted data in the device.