Patent classifications
G08B13/2428
TAG DETECTION USING WAVEFORM RADIATING DEVICES
Systems and methods for detecting a security tag. The methods comprise: detecting motion of the security tag while in use to protect an article from unauthorized removal from a protected area; and emitting a first waveform from a radiating device of the security tag in response to the motion's detection. The first waveform is detectable by an Electronic Article Surveillance (EAS) monitoring system. The radiating device comprises a device other than an EAS element, a Radio Frequency Identification (RFID) device and a Near Field Communication (NFC) enabled device.
Devices and techniques for deactivating tags
This disclosure describes, in part, devices and methods for deactivating tags. For instance, an electronic device may include antennas that transmit signals and/or fields for deactivating the tags. In some examples, the electronic device includes a first gate that includes a first portion of the antennas and a second gate that includes a second portion of the antennas. To deactivate the tags, the electronic device may detect locations of an object relative to the electronic device. The electronic device may then activate a respective tag and/or a respective group of tags based on the location of the object. For example, the electronic device may activate a first tag and/or a first group of tags when the object is at a first location, activate a second tag and/or a second group of tags when the object is at a second location, and/or so forth.
THERMAL SCALE RADIO FREQUENCY LABEL
A thermal scale radio frequency label which includes a top layer of thermal paper of 20-60 lb weight with an RF antenna mounted on the thermal paper. The RF antenna includes a single turn inductor coil having a width of not less than 5 mm and not more than 13 mm. The inductor coil has a thickness in the range of 30-60 um and covers an area of at least 5549 mm. A capacitative layer is provided having a thickness in the range of 30-60 um. A dielectric layer is positioned between the capacitative layer and the inductor coil. A plurality of electrical connections are provided between the capacitative layer and the inductor coil. The electrical connections are capable of being deactivated by RF energy.
CONTAINER FRAUD DETECTION SYSTEM AND METHOD
A container fraud detection system and method using one or more wireless communication tags attached to a container in specific ways to ensure the authenticity of the contents. The tag is affixed to the container in such a way that the tag is destroyed upon opening of the container, thereby indicating fraud upon scanning. The tag may be affixed to the container by an adhesive strip, polymer film or wax composition. The tag may be affixed to an adhesive strip prior to application of the strip to a container. Two tags on the container or strip may be cryptographically linked. The tag information is accessible through a scanning device which communicates with a database that stores information about the container and analyzes the probability of fraud with an algorithm.
MERCHANDISE DISPLAY SECURITY SYSTEMS AND METHODS
Merchandise security systems and methods are provided. In one example, a merchandise security system includes a plurality of security devices arranged in a wireless network, wherein the plurality of security devices are arranged in a planogram and each configured to protect one or more items from theft, each of the plurality of security devices configured to wirelessly communicate data with a remote device. The system also includes a plurality of electronic keys arranged in the wireless network and configured to wirelessly communicate data with the plurality of security devices and/or the remote device. Each of the plurality of electronic keys is configured to operate the plurality of security devices. The system also includes a gateway configured to receive the data from the plurality of security devices and electronic keys via wireless communication, wherein the gateway is configured to communicate the data to the remote computing device.
Method and system for state-based power management of asset tracking systems for non-statutory assets
A method and system for power consumption management for moveable assets is provided. Various states and modes are defined, in which elements of the system may operate, each state and mode having different power requirements based on different operational requirements and communication paradigms. Various triggers may indicate which state and mode to be in, with the lowest power consumption operating status being selected whenever possible based on the triggers.
Bottle fraud detection system and method
A bottle fraud system and method encapsulates a wireless communication tag into a bottle to ensure the authenticity of the bottle. The tag stores information about the bottle. The tag is physically integrated into a bottle stopper through encapsulation by multiple layers of a polymer film and a wax composition. The physical condition to the bottle stopper or the layers serves as an indication of whether tampering has occurred. The information in the tag is accessible through a reading device. The reading device communicates with a database that stores information about the bottle and analyzes the probability of fraud with an algorithm. The algorithm analyzes the information about the bottle, such as shipping history, contents and location, to predict whether fraud is likely. Thus, both the physical condition of the bottle, and the predictive capacity of the algorithm help detect fraud on the bottle.
Eye glasses with individual user awareness
A portable item reporting device (PIRD) is configured to detect an individual person's use of conventional consumer eyeglasses. A PIRD includes a microprocessor, memory, one or more environmental detectors (such as optical detectors, motion detectors, cameras, and location detectors, as well as timer elements and possibly calendar elements. With the integrated electronics, the eyeglasses with PIRD may self-identify contexts in which the glasses may be lost, stolen, or misplaced. The eyeglasses with PIRD may also identify when the glasses have been covered over with papers or other objects (such as when set down on a desk), so that the owner of glasses may be at risk of losing or forgetting the glasses. A camera of the glasses may also maintain an ongoing record of user activity when the user is wearing the glasses. The record may aid the user in later identifying other personal items which the user set down and forgot to pick up again.
EYE GLASSES WITH INDIVIDUAL USER AWARENESS
A portable item reporting device (PIRD) is configured to detect an individual person's use of conventional consumer eyeglasses. A PIRD includes a microprocessor, memory, one or more environmental detectors (such as optical detectors, motion detectors, cameras, and location detectors, as well as timer elements and possibly calendar elements. With the integrated electronics, the eyeglasses with PIRD may self-identify contexts in which the glasses may be lost, stolen, or misplaced. The eyeglasses with PIRD may also identify when the glasses have been covered over with papers or other objects (such as when set down on a desk), so that the owner of glasses may be at risk of losing or forgetting the glasses. A camera of the glasses may also maintain an ongoing record of user activity when the user is wearing the glasses. The record may aid the user in later identifying other personal items which the user set down and forgot to pick up again.