Patent classifications
G08B13/2402
Anti-theft security device and perimeter detection system
A security system in accordance with an embodiment of the present invention includes a security tag operable for connection to an object, a monitoring device operable to monitor whether a party removes or attempts to remove the security tag from the object; an alarm operable to emit a tamper signal when the monitoring device indicates that a party has removed or attempted to remove the security tag from the object in an unauthorized removal condition, and a remote collector system adapted to communicate with the security tag to set the security tag in the unauthorized removal condition and an authorized removal condition, wherein upon receipt of the tamper signal, the remote collector system generates a security message.
RFID Multi-Read Portal
A system and method for multi-reading RFID codes is disclosed. The system may comprise a portal, a RFID reader, an entrance sensor, an exit sensor and a controller. The controller is configured to receive the RFID code data and the read timestamp for each article, receive the start trigger timestamp and the stop trigger timestamp, determine a read area time range based on the start trigger timestamp and the stop trigger timestamp, determine an active read area timeframe based on the read area time range as adjusted by a pre-read offset and a post-read offset, associate RFID code data with the first group if the read timestamp associated with the RFID code data occurred during the active read area timeframe, and process the RFID code data of the first group and transmit a result of the processing of the first group to an output interface.
ELONGATE FLEXIBLE TAG
Systems and methods for providing a tag. The tag comprising a flexible elongate structure comprising a cord or a cable; an electronic thread device integrated into the cord or cable that is operative to wirelessly communicate with external devices for inventory management or security purposes; and/or an Electronic Article Surveillance (“EAS”) component integrated into the cord or cable.
FIXED PROPERTY MONITORING WITH MOVING ASSET LOCATION TRACKING
Techniques are described for moving asset location tracking and monitoring system technology. A system monitors for events related to a monitoring system that monitors a fixed property and the system detects an event related to the monitoring system based on the monitoring. The system performs an operation that leverages geographic location tracking of at least one mobile asset associated with the fixed property based on the detected event.
Programmable security system and method for protecting merchandise
A programmable security system and method for protecting an item of merchandise includes a programming station, a programmable key and a security system. The programming station generates a security code and communicates the security code to a memory of the programmable key. The programmable key initially communicates the security code to a memory of the security device and subsequently operates the security device upon a matching of the security code in the memory of the security device with the security code in the memory of the programmable key. The programmable key may also transfer power via electrical contacts or inductive transfer from an internal battery to the security device to operate a lock mechanism. The security code may be communicated by wireless infrared (IR) systems, electrical contacts or inductive transfer. A timer inactivates the programmable key and/or the security device after a predetermined period of time. A counter inactivates the programmable key after a predetermined maximum number of activations.
Programmable security system and method for protecting merchandise
A programmable security system and method for protecting an item of merchandise includes a programming station, a programmable key and a security system. The programming station generates a security code and communicates the security code to a memory of the programmable key. The programmable key initially communicates the security code to a memory of the security device and subsequently operates the security device upon a matching of the security code in the memory of the security device with the security code in the memory of the programmable key. The programmable key may also transfer power via electrical contacts or inductive transfer from an internal battery to the security device to operate a lock mechanism. The security code may be communicated by wireless infrared (IR) systems, electrical contacts or inductive transfer. A timer inactivates the programmable key and/or the security device after a predetermine period of time. A counter inactivates the programmable key after a predetermined maximum number of activations.
System and method for deterring theft
A theft deterring system includes a power tool with a motor connectable to a power source, a switch connected to the motor, a controller controlling to the switch for controlling an amount of power provided to the motor, and a state circuit having a memory for storing a state value. The controller activates the switch to provide power to the motor when the state value stored in the memory equals a desired value. The system may also include a tag programmer for changing the stored value.
Systems and Methods for Theft Prevention and Detection
A system and method for premises theft prevention and detection. A system comprises a media capture device, a target area and target object at a workstation, and operably configured code in non-transitory computer readably storage media. A system recognizes a theft or misappropriation and can notify a business owner or police. The system is powered by machine-learning algorithms that progressively improve accuracy and precision in theft detection.
Wireless dual-mode identification tag
Embodiments of the present disclosure generally relate to a wireless identification tag for association with a product to enable product self-identification and system and methods for use thereof. In one implementation, the tag may include at least one antenna tuned to receive energy transmitted at one or more frequencies within certain frequency bands. The tag may also include at least one transmitter that may be configured to send at least one identification signal. The tag may also include at least one circuit. The at least one circuit may be configured to detect whether energy is received in a certain frequency band, and to cause the at least one transmitter to operate in a mode corresponding to the certain frequency band.
SECURITY SYSTEM WITH KILL SWITCH FUNCTIONALITY
A merchandise display security system for displaying and protecting an article of merchandise is provided. In one example, the system includes a sensor configured to be coupled to an article of merchandise and to communicate with the article of merchandise. The system also includes a tower configured to receive a signal from the sensor in response to a security event. The tower is further configured to generate a kill switch signal for determining whether to activate a kill switch on the article of merchandise.