Patent classifications
G08B13/2451
Wireless sensor network
A building sensor node of a sensor network system, wherein the sensor node includes one or more memory devices configured to store instructions thereon, that, when executed by one or more processors, cause the one or more processors to execute a first function to provide a first functionality, wherein the first function is associated with a next function identifier of a next function. The instructions further cause the one or more processors to transition between a number of states of a state machine based on the next function identifier, verify execution of the next function by comparing the next function identifier to a table of allowed transitions receive an additional function from a server, and update the sensor node to provide a second functionality to the sensor node without rebooting the sensor node based on the additional function received from the server.
Adaptive video advertising using EAS pedestals or similar structure
Adaptive system for communicating with a customer in a retail store environment includes a sensor disposed at a sensor location in a retail environment. The sensor location is selected so that the sensor captures information that facilitates identification of at least one trait associated with a customer located proximate to the sensor location. A processing system is configured to use the information to determine the at least one trait. Thereafter, in response to such determination, the processing system selectively determines a message or content selection to be displayed to the customer based at least in part on the at least one trait that has been identified.
FOREIGN RFID TAG DISCRIMINATION AND MANAGEMENT
Managing foreign RFID tags within a secured area involves use of a first RFID portal system to read tag data from an RFID tag present within a first portal zone. A processing device associated with the first RFID portal system is used to determine whether the RFID tag is entering the secured area. The determination is based on an evaluation of a direction of travel of the RFID tag through the first portal zone. Responsive to determining that the RFID tag is in fact entering the secured area, one or more operations are performed to cause a first tag value corresponding to the tag data to be added into a safe to exit (STE) list.
Mobile storage, tracking and security system and method thereof
A portable asset dispensing device includes a container configured to be moved to a plurality of locations, an interior and an end. A door is positioned at the end of the container and includes a locking mechanism. A security access device is disposed at the end and configured to accept access information, and a controller controls access into the container and tracks a plurality of items within the interior of the container. The device includes a plurality of radio frequency identification (RFID) readers disposed within the interior of the container, the plurality of RFID readers being configured to detect RFID tags located on the plurality of items within the interior of the container and communicate the items to the controller.
SMART PRODUCT LABEL PLATFORM
A tag or label incorporating embedded trigger technology, such as RFID, QR codes, or barcodes is disclosed to effectively integrate RFID or a trigger directly into the garment. Typically, the embedded technology is embedded via a digital manufacturing process, and the labels and tags enable a data connection via the embedded triggers and a unique identifier corresponding to the embedded triggers. Thus, once the trigger technology is enabled via scanning, visual recognition, UHF/NFC RFID, etc., data items in the data management platform are enabled. Specifically, the data items within the data management platform include sustainability, consumer engagement, authentication/brand protection, merchandising/marketing, and data management and can be leveraged to drive an interactive consumer experience.
Foreign RFID tag discrimination and management
Managing foreign RFID tags within a secured area involves use of a first RFID portal system to read tag data from an RFID tag present within a first portal zone. A processing device associated with the first RFID portal system is used to determine whether the RFID tag is entering the secured area. The determination is based on an evaluation of a direction of travel of the RFID tag through the first portal zone. Responsive to determining that the RFID tag is in fact entering the secured area, one or more operations are performed to cause a first tag value corresponding to the tag data to be added into a safe to exit (STE) list.
System and Method for Attack Detection in Wireless Beacon Systems
A system and a method for attack detection includes a constellation of beacons, wherein each beacon is adapted to broadcast a unique beacon identification code (beacon ID); a terminal device adapted to receive a user trace of beacon IDs, and send a query to a backend server or routing device to determine an occurrence of an intrusion via a network; wherein the backend server is adapted to determine an occurrence of an intrusion by carrying out the steps of: computing spatial relational metrics between beacon devices; transforming beacon IDs as states of a Markov chain model, and estimating state transition probabilities based on the spatial relational metrics; recording user traces of beacon ID transitions when terminal device make queries; and running hypothesis test on the user traces against the Markov chain model to determine a status of intrusion.
System and method for attack detection in wireless beacon systems
A system and a method for attack detection includes a constellation of beacons, wherein each beacon is adapted to broadcast a unique beacon identification code (beacon ID); a terminal device adapted to receive a user trace of beacon IDs, and send a query to a backend server or routing device to determine an occurrence of an intrusion via a network; wherein the backend server is adapted to determine an occurrence of an intrusion by carrying out the steps of: computing spatial relational metrics between beacon devices; transforming beacon IDs as states of a Markov chain model, and estimating state transition probabilities based on the spatial relational metrics; recording user traces of beacon ID transitions when terminal device make queries; and running hypothesis test on the user traces against the Markov chain model to determine a status of intrusion.
Smart product label platform
A tag or label incorporating embedded trigger technology, such as RFID, QR codes, or barcodes is disclosed to effectively integrate RFID or a trigger directly into the garment. Typically, the embedded technology is embedded via a digital manufacturing process, and the labels and tags enable a data connection via the embedded triggers and a unique identifier corresponding to the embedded triggers. Thus, once the trigger technology is enabled via scanning, visual recognition, UHF/NFC RFID, etc., data items in the data management platform are enabled. Specifically, the data items within the data management platform include sustainability, consumer engagement, authentication/brand protection, merchandising/marketing, and data management and can be leveraged to drive an interactive consumer experience.
FOREIGN RFID TAG DISCRIMINATION AND MANAGEMENT
Managing foreign RFID tags within a secured area involves use of a first RFID portal system to read tag data from an RFID tag present within a first portal zone. A processing device associated with the first RFID portal system is used to determine whether the RFID tag is entering the secured area. The determination is based on an evaluation of a direction of travel of the RFID tag through the first portal zone. Responsive to determining that the RFID tag is in fact entering the secured area, one or more operations are performed to cause a first tag value corresponding to the tag data to be added into a safe to exit (STE) list.