G08B13/2451

Systems and methods for RFID-based retail management
11915567 · 2024-02-27 · ·

A system for RFID-based retail management that includes a set of antennas, an RFID transceiver connected to the set of antennas; and a microprocessor-based system manager that controls the RFID transceiver and transforms RFID response data from the RFID transceiver into RFID tag location data according to read probability methods.

ENERGY HARVESTING SYSTEMS AND METHODS
20190356173 · 2019-11-21 ·

A system and method for harvesting radio frequency energy for powering devices includes one or more antennas tuned to receive radio frequency signals from different sources and an energy harvester configured to derive energy from the radio frequency signals and provide power to a power consuming device. A power integrator can store the energy until it is needed by the power consuming device. The energy harvester can extract data from one or more of the radio frequency signals and transmit the data to the power consuming device. The power consuming device can change an operational mode based on the amount of power received or the data received from the energy harvester. The power consuming device can transmit data to one of the sources to increase radio frequency signal transmissions to increase the amount of energy harvested by the energy harvester and delivered to the power consuming device.

SYSTEM AND METHOD FOR DETECTING AND ANONYMOUSLY TRACKING FIREARMS INCLUDING A DECENTRALIZED DISTRIBUTED LEDGER SYSTEM
20190287325 · 2019-09-19 · ·

A system for detecting the presence of firearms includes a radiofrequency identification (RFID) tag embedded within each firearm. The RFID tag may be passive or active but is preferably passive for permanent installation and long-term use. Using an Electronic Product Code (EPC) type data structure, the RFID tag stores a unique data string identifying the manufacturer, model, firearm type (object class), caliber and unique RFID tag number for the firearm. Public spaces, buildings, schools may install RFID readers to discretely transmit an interrogating signal from a distance without invasive searches. The reader systems may be integrated with building security for real-time tracking on a display, triggering automated alarms or triggering lockdown procedures. The unique RFID tag number obtained may be cross-referenced with other private data in secure, encrypted databases to maintain privacy.

Systems and methods of product interaction recognition using sensors within a tag

Systems and methods for managing inventory. The methods comprise: generating sensor data by an Electronic Smart Tag (EST); processing, by the EST or a computing device remote from the EST, the sensor data to transform the same into information specifying at least one of a first person's intention with regard to an item to which the EST is coupled and the first person's interest in the item; generating a notification or a recommendation relating to inventory management, based on at least one of the first person's intention with regard to the item and the first person's interest in the item; and providing the notification or recommendation to a second person.

WIRELESS SENSOR NETWORK
20190228626 · 2019-07-25 · ·

A building sensor node of a sensor network system, wherein the sensor node includes one or more memory devices configured to store instructions thereon, that, when executed by one or more processors, cause the one or more processors to execute a first function to provide a first functionality, wherein the first function is associated with a next function identifier of a next function. The instructions further cause the one or more processors to transition between a number of states of a state machine based on the next function identifier, verify execution of the next function by comparing the next function identifier to a table of allowed transitions receive an additional function from a server, and update the sensor node to provide a second functionality to the sensor node without rebooting the sensor node based on the additional function received from the server.

MOBILE STORAGE, TRACKING AND SECURITY SYSTEM AND METHOD THEREOF
20190172331 · 2019-06-06 ·

A portable asset dispensing device includes a container configured to be moved to a plurality of locations, an interior and an end. A door is positioned at the end of the container and includes a locking mechanism. A security access device is disposed at the end and configured to accept access information, and a controller controls access into the container and tracks a plurality of items within the interior of the container. The device includes a plurality of radio frequency identification (RFID) readers disposed within the interior of the container, the plurality of RFID readers being configured to detect RFID tags located on the plurality of items within the interior of the container and communicate the items to the controller.

Wireless sensor network
10297128 · 2019-05-21 · ·

A networked system for managing a physical intrusion detection/alarm includes an upper tier of server devices, comprising: processor devices and memory in communication with the processor devices, a middle tier of gateway devices that are in communication with upper tier servers, and a lower level tier of devices that comprise fully functional nodes with at least some of the functional nodes including an application layer that execute routines to provide node functions, and a device to manage the lower tier of devices, the device instantiating a program manager that executes a state machine to control the application layer in each of the at least some of the functional nodes.

Personnel authentication and tracking system

Disclosed are techniques to authenticate tags passing through detection regions against an access control list, receive data that identifies a number of people passing through or within the detection regions, compare the number people identified by the received data with the number of tags identified by the system, and cause an alarm to be asserted when a discrepancy is detected in the number people identified with the number of tags in a detection region with personnel within the detection region.

Device for protection against theft, corresponding method and computer program
10217104 · 2019-02-26 · ·

An antitheft protection device that includes an electronic antitheft element. The device also includes an element for deactivating the electronic antitheft element; an energy supply at least indirectly powering said element for deactivating the electronic antitheft element; and an element to receive a command to deactivate the electronic antitheft element.

Systems and methods for tracking items removed without authorization from secured locations
10186125 · 2019-01-22 · ·

Tracking items of items in a facility involves using an RFID portal system to determine when an EAS tag containing an RFID element has exited from a secured area within the facility. The EAS tag is triggered to initiate a wireless beacon signal upon exiting. Thereafter, control logic associated with the EAS tag is used to cause the wireless beacon signal to be communicated at predetermined intervals. The wireless beacon signal includes unique identifier information concerning the EAS tag. When the beacon signal is received at one or more short range communication (SRC) devices outside the secured area, its location is determined.