Patent classifications
G08B13/2402
Programmable security system and method for protecting merchandise
A programmable security system and method for protecting an item of merchandise includes a programming station, a programmable key and a security system. The programming station generates a security code and communicates the security code to a memory of the programmable key. The programmable key initially communicates the security code to a memory of the security device and subsequently operates the security device upon a matching of the security code in the memory of the security device with the security code in the memory of the programmable key. The programmable key may also transfer power via electrical contacts or inductive transfer from an internal battery to the security device to operate a lock mechanism. The security code may be communicated by wireless infrared (IR) systems, electrical contacts or inductive transfer. A timer inactivates the programmable key and/or the security device after a predetermine period of time. A counter inactivates the programmable key after a predetermined maximum number of activations.
System for simultaneous tag triggering and sequential tag reading
Embodiments of the present disclosure generally relate to systems, methods, and computer readable media containing instructions for causing simultaneous triggering and sequential reading of a plurality of tags. In one implementation, the instructions may include displaying an activatable element on a graphical user interface for activating a 2.4 GHz transmitter. The instructions may also include activating the transmitter to cause each of a plurality of tags to send a unique tag ID to a receiver. The instructions may also include reading a first group of tag IDs during a first time interval; recording first information associated with the first group; maintaining activation of the transmitter to cause transmission of at least some of the tag IDs of the first group along with the unique tag IDs of a second group of tag IDs to the receiver; and recording second information associated with the second group.
MOBILE DEVICE CASE FOR SECURED ACCESS AND IMPROVEMENTS
Mobile device cases are provided which, in a first embodiment, selectively limit a user's ability to control the user's own mobile electronic device. The case includes front and rear portions joined together and defining therein an opening for receiving a mobile electronic device, such as a mobile phone. A locking mechanism is provided for selectively securing the opening in a first locked position to prevent operational access to the mobile electronic device by the user until a predetermined condition is met. The case includes an indicia of time visible to the user during the period of time of prevented operational access. In a further embodiment, a case is provided with first and second polymeric shells each having an interior and an exterior surface thereon and connected together by at least one hinge portion. The first and second shell portions form a cavity of sufficient size to cover a mobile electronic device sufficiently to prevent access by its user. Tamper resistant and ultrasonic sensor defeating mobile device case embodiments are also contemplated by this invention.
Wireless dual-mode identification tag
Embodiments of the present disclosure generally relate to systems and methods for providing privacy to downstream owners of electronically tagged goods. In one implementation, the system may include at least one processor that may be configured to store IDs for a plurality of tags including at least a first owner ID and a second owner ID for a particular tag; associate first information of the particular tag with the first owner ID at a time when the first owner of the particular tag is recorded as owning the tag; record a transaction transferring ownership of the particular tag from the first owner to a second owner; and after the transfer of ownership, associate second information of the particular tag with the second owner ID, and prevent the first owner from accessing the second information.
Fixed property monitoring with moving asset location tracking
Techniques are described for moving asset location tracking and monitoring system technology. A system monitors for events related to a monitoring system that monitors a fixed property and the system detects an event related to the monitoring system based on the monitoring. The system performs an operation that leverages geographic location tracking of at least one mobile asset associated with the fixed property based on the detected event.
INVENTORY CONTROL
The discussion relates to inventory control. In one example, a set of ID sensors can be employed in an inventory control environment and subsets of the ID sensors can collectively sense tagged items in shared space. Data from the subset of ID sensors can indicate when a user has taken possession of an individual tagged item in the shared space.
Theft-prevention system and method with magnetic field detection
An electronic theft-alerting system, including magnetometers, such as multiaxis magnetometers, arranged in respective stations and configured to output respective vector signals representing movement of respective magnetic field vectors; and a signal processor coupled to receive the first and second vector signals, and configured to detect a corresponding movement of a first magnetic field vector and a second magnetic field vector. Detecting commencement and continuance of fluctuation the first magnetic field vector, determining whether to raise or forgo to raise an alarm that warns about a possible theft-related event in response to the determining of commencement and continuance of fluctuation of the first magnetic field vector or the second magnetic field vector.
Autonomous sensor placement discovery method and apparatus
Systems, apparatuses, and methods for autonomous sensor placement discovery for RFID systems are disclosed. Sensors are deployed in a brick and mortar store that can scan for and receive signals from a plurality of locating tags as well as RFID tags. The locating tags may transmit ultra-wideband signals in response to a scan to provide precise determination of the location of each locating tag relative to a detecting sensor. Each sensor may also include a locating tag to enable determining the location of each sensor. The location information from the locating tags is provided to a gateway, which can provide a display of the locations of sensors and locating tags in the brick and mortar store and areas of no coverage, as well as autonomously control various parameters of the sensors to minimize or eliminate some or all areas of no coverage.
Multiple-factor verification for vision-based systems
A system and method for interaction monitoring in a retail environment that includes executing a first monitoring system and thereby generating a first evaluation of customer selection of items; executing a second monitoring system and thereby generating a second evaluation of customer selection of items; determining monitoring alignment between the first evaluation and the second evaluation of a first customer; and triggering an action in response to the monitoring alignment.
Touch-type control system, control device and monitor device for merchandise security
The present invention provides a touch-type control system, a control device and a monitor device for merchandise security, including a controller and a monitor device, where the monitor device has an identifiable communication interface capable of communicating with the controller, and is configured to communicate with the controller via the identifiable communication interface and be initialized by a controller in communication therewith. The controller further comprises a touch-type communication interface for communicating with the monitor device, and is configured to be capable of controlling the monitor device initialized by the controller via the touch-type communication interface. In the system, the controller can communicate with the monitor device by means of a touch manner, thereby identifying, controlling and powering the monitor device, thereby solving the problem of the unification of power supply and data in the system.