Patent classifications
G08B13/2402
Multi-voltage power supply system for merchandise security
The present invention provides a multi-voltage power supply system for merchandise security, including a sensor configured to be connected to a plurality of merchandise, respectively, and an alarm including at least one interface for connecting the sensor, wherein the alarm is configured to be able to receive power and a safety signal from the sensor; the sensor is configured to be connectable to a power adapter via a power interface and to power the connected merchandise and/or alarm. In the present invention, the sensor is connected to an external power adapter, and the external power adapter supplies power to the sensor, and then the sensor supplies power to other components in a merchandise or an security system, such as the alarm, thereby reducing the input ports of the external power source and enabling the display of the security system more concise.
APPARATUS FOR REMOVING A SECURITY TAG FROM AN ARTICLE
A detaching device for releasing a tack body from a tag housing is disclosed. the detaching device includes a housing, a handle pivotally mounted to the housing and configured to pivot about a handle axis. The device further includes a detacher translation mechanism configured to move a detacher portion from a first non-release position to a second release position, wherein the detacher translation mechanism converts rotational movement of the handle about the handle axis to rotational movement of the detacher portion about a first axis, wherein when the detacher portion moves to the second release position, the detacher portion is configured to be received by a receiving portion of the tag housing thus releasing the tack body from the tag housing.
Grading control system and control device for merchandise security
The invention provides a grading control system and a control device for merchandise security, including at least two controllers and a plurality of monitor devices, wherein the controller comprises at least one main controller and at least one auxiliary controller. The monitor device has an identifiable communication interface that is capable of communicating with the controller, and is configured to be communicable with the controller via the identifiable communication interface, and to be initialized by the controller in communication therewith. The monitor device initialized by the auxiliary controller can be controlled by the main controller and the auxiliary controller. In this system, the controller can control the monitor devices within a set range according to the different privilege/level settings, respectively. The range controlled by the controller in the same system may be divided into different grades of control, realizing the control of grading and sub-regions and reflecting grading management.
Information management system for tagged goods
Embodiments of the present disclosure generally relate to systems and methods for providing access to information associated with electronically tagged goods. In one implementation, the system may include at least one processor configured to store tag IDs of a plurality of tags; and receive a pairing between a particular tag ID and a product ID. The at least one processor may also be configured to receive a pairing between the particular tag ID and an authorized entity associated with the particular tag ID; and receive, from a requester, a query including an encrypted tag ID of the particular tag. The at least one processor may also be configured to decrypt the encrypted tag ID; determine if the requester is the authorized entity; fulfill the query, if the requester is the at least one authorized entity; and deny the query if the requester is not the at least one authorized entity.
System configured for spoofing avoidance
Embodiments of the present disclosure generally relate to a wireless identification fraud avoidance system and methods for use thereof. In one implementation, the system may include at least one transmitter configured to transmit a first signal to a plurality of identification tags and to cause the identification tags to transmit a second signal. The system may also include a first, proximate receiver configured to receive the second signal from the identification tags. The system may also include a second, more distant receiver configured to receive a third signal from a tag outside a transmission range of the at least one transmitter. The system may also include at least one processor configured to generate a potential fraud alert when the second receiver receives the third signal.
Monitoring system
A monitoring system for deriving a measurement of a separation distance between a monitor and one or more tags, where each tag is adapted to be attached to or contained within an object to be monitored, comprises a monitor that is operable to trigger an event if the separation distance exceeds a set separation limit. A frequency of packet exchange between a tag and monitor is dynamically altered based on a comparison of one or more.
WIRELESS DEVICE CONFIGURED FOR POWERING TRANSMISSIONS WITH HARVESTED ENERGY
Embodiments of the present disclosure generally relate to a wireless identification tag configured to harvest ambient energy and transmit an identification signal intermittently, and system and methods for use thereof. In one implementation, the tag may include an antenna configured to receive ambient energy. The tag may also include an energy storage component configured to aggregate and store the received ambient energy. The tag may also include a transmitter electrically connected to the energy storage component and configured to transmit the identification signal. The tag may also include a circuit connected to the transmitter and configured to implement an identification transmission rule, to cause the transmitter to delay sending the identification signal even when sufficient energy for transmission of the identification signal is aggregated and stored in the energy storage component.
CAPACITOR ARCHITECTURE FOR WIRELESS COMMUNICATION TAG
Embodiments of the present disclosure generally relate to a wireless identification tag configured to collect and store ambient energy for use in delayed transmission, and system and methods for use thereof. In one implementation, the tag may include a receiver for receiving ambient energy; a first capacitor for storing the ambient energy; and a second capacitor for collecting and storing the ambient energy. The second capacitor may have lower capacitance than the first capacitor. The tag may also include an inductor interconnecting the first capacitor and the second capacitor. The tag may also include circuitry configured such that ambient energy received by the receiver is initially stored in the second capacitor and subsequently transferred to and stored in the first capacitor. The tag may also include a transmitter electrically connected to first capacitor, to enable the energy stored in the first capacitor to power the transmitter.
ELONGATE FLEXIBLE TAG
Systems and methods for providing a tag. The tag comprising a flexible elongate structure comprising a cord or a cable; an electronic thread device integrated into the cord or cable that is operative to wirelessly communicate with external devices for inventory management or security purposes; and/or an Electronic Article Surveillance (EAS) component integrated into the cord or cable.
INFORMATION MANAGEMENT SYSTEM FOR TAGGED GOODS
Embodiments of the present disclosure generally relate to systems and methods for providing access to information associated with electronically tagged goods. In one implementation, the system may include at least one processor configured to store tag IDs of a plurality of tags; and receive a pairing between a particular tag ID and a product ID. The at least one processor may also be configured to receive a pairing between the particular tag ID and an authorized entity associated with the particular tag ID; and receive, from a requester, a query including an encrypted tag ID of the particular tag. The at least one processor may also be configured to decrypt the encrypted tag ID; determine if the requester is the authorized entity; fulfill the query, if the requester is the at least one authorized entity; and deny the query if the requester is not the at least one authorized entity.