Patent classifications
G08B13/2402
Wireless device for ambient energy harvesting
Embodiments of the present disclosure generally relate to a wireless identification tag configured to harvest ambient energy and transmit an identification signal intermittently, and system and methods for use thereof. In one implementation, the tag may include a transmitter configured to transmit a first signal to a first receiver in a first frequency, and to transmit a second signal to a second receiver in the first frequency. The tag may also include an energy storage component configured for collecting and storing ambient energy and for powering transmission of the transmitter. The tag may also include a circuit configured to monitor energy stored in the energy storage component, and to prevent the transmitter from transmitting the first signal to the first receiver when the energy stored in the energy storage component is insufficient to transmit the second signal to the second receiver.
Tag configured for interaction with security gate
Embodiments of the present disclosure generally relate to a wireless identification tag triggerable by an EAS gate while remaining invisible to the EAS gate, and system and methods for use thereof. In one implementation, the tag may include an antenna tuned to receive energy transmitted in at least one EAS gate frequency range and configured to be non-detectable by the EAS gate. The tag may also include a transmitter configured to send an identification signal and an energy storage component for powering the transmitter. The tag may also include a circuit connected to the antenna. The circuit may be configured to detect energy transmitted from the EAS gate in at least one of the EAS gate frequency ranges, and to cause the transmitter to transmit, to a receiver other than the EAS gate, the identification signal in a frequency outside the EAS gate frequency ranges.
Package tracking utilizing modifiable delivery tags
In some examples, a movement range indicating a geospatial boundary for executing delivery of a package including a delivery tag may be received by a user device. The delivery tag can include a modifiable display area including first identification information. Location information related to the user device or related to the delivery tag can also be received. A position of the user device or the delivery tag with respect to the geospatial boundary can be determined. Based on the position, the modifiable display area of the delivery tag can be modified to include second identification information.
Security device utilizing the electronic components of an electronic gadget to produce an alarm
The anti-theft device for securing an electronic gadget against theft. A security sensor is attached to a rear surface of the electronic gadget. The security sensor is electrically coupled to the electronic gadget via a cable. A security software application is deployed on the electronic gadget. The security sensor is configured to transmit predefined security signal to the electronic gadget. The security application is configured to detect the predefined security signal. Responsive to detecting a security event, the security sensor stops transmitting the security signal. The security application is configured to transition the electronic gadget into an alarm state if the security application fails to receive the security signal.
METHOD AND SYSTEM FOR SELF-CHECKOUT IN A RETAIL ENVIRONMENT
The present disclosure relates to systems and methods for contactless checkout in a retail environment including a security pedestal located at an entrance or exit to a retail location. The system further includes a scanning device that is communicably coupled with the security pedestal. The self-checkout system and methods may also include a processing system that is configured to receive a list of items from the security pedestal and customer identification code from the scanning device. The system and method is configured to allow for a customer to scan his purchases at the security pedestal and pay for the purchases through the use of the customer identification code generated, preferably, using the customer's personal computing device.
Identification tag configured for variable intervals between signal transmissions
Embodiments of the present disclosure generally relate to a wireless identification tag with varying ID transmission timing, and system and methods for use thereof. In one implementation, the tag may include at least one transmitter and an energy storage component electrically connected to the at least one transmitter. The energy storage component may be configured to collect and store ambient energy and to power transmission of the at least one transmitter. The tag may also include at least one circuit. The at least one circuit may be configured to cause the at least one transmitter to transmit a sequence of identification signals in non-uniform intervals such that times between identification signal transmissions of three consecutive transmissions vary.
Mobile device case for secured access and improvements
Mobile device cases are provided which, in a first embodiment, selectively limit a user's ability to control the user's own mobile electronic device. The case includes front and rear portions joined together and defining therein an opening for receiving a mobile electronic device, such as a mobile phone. A locking mechanism is provided for selectively securing the opening in a first locked position to prevent operational access to the mobile electronic device by the user until a predetermined condition is met. The case includes an indicia of time visible to the user during the period of time of prevented operational access. In a further embodiment, a case is provided with first and second polymeric shells each having an interior and an exterior surface thereon and connected together by at least one hinge portion. The first and second shell portions form a cavity of sufficient size to cover a mobile electronic device sufficiently to prevent access by its user. Tamper resistant and ultrasonic sensor defeating mobile device case embodiments are also contemplated by this invention.
INVENTORY TRACKING SYSTEMS AND METHODS
Systems, devices, and methods of tracking merchandise to be stored in a secure enclosure are provided. In one embodiment, an inventory tracking device comprises a secure enclosure, having a monitored space defined by a fixed portion and a movable portion and configured to store one or more items of merchandise in the monitored space. Each item of merchandise has a radio frequency identification (RFID) tag to identify the respective item of merchandise. The movable portion is configured to move between an opened position and a closed position, the opened position allowing items of merchandise to be placed into or removed from the monitored space. The inventory tracking device further comprising an RFID reader configured, in response to the movable portion being moved to the opened position or the closed position, to detect the presence of the one or more items of merchandise within the monitored space of the secure enclosure.
SYSTEM, DEVICE AND METHODS FOR PROTECTING A USER DEVICE
In accordance with a first aspect of the present disclosure, a system is provided, comprising: a user device to be monitored for unauthorized displacement, an ultra-wideband (UWB) communication unit configured to set up a UWB communication channel with an external localization device and to perform at least one localization operation through said UWB communication channel, and a processing unit configured to detect said unauthorized displacement of the user device by analyzing an output of said localization operation. In accordance with a second aspect of the present disclosure, a localization device is provided, comprising: an ultra-wideband (UWB) communication unit configured to set up a UWB communication channel with an external system and to perform at least one localization operation through said UWB communication channel, and a processing unit configured to detect an unauthorized displacement of a user device comprised in said external system by analyzing an output of said localization operation. In accordance with further aspects of the present disclosure, corresponding methods are conceived and corresponding computer programs are provided.
PROGRAMMABLE SECURITY SYSTEM AND METHOD FOR PROTECTING MERCHANDISE
A programmable security system and method for protecting an item of merchandise includes a programming station, a programmable key and a security system. The programming station generates a security code and communicates the security code to a memory of the programmable key. The programmable key initially communicates the security code to a memory of the security device and subsequently operates the security device upon a matching of the security code in the memory of the security device with the security code in the memory of the programmable key. The programmable key may also transfer power via electrical contacts or inductive transfer from an internal battery to the security device to operate a lock mechanism. The security code may be communicated by wireless infrared (IR) systems, electrical contacts or inductive transfer. A timer inactivates the programmable key and/or the security device after a predetermine period of time. A counter inactivates the programmable key after a predetermined maximum number of activations.