G08B13/2431

TAMPER DETECTION DEVICE
20170345269 · 2017-11-30 ·

According to a first aspect of the present disclosure, an electronic tamper detection device is provided, comprising a tamper loop and a deformable component, wherein a deformation of said component indicates that the tamper loop has been broken. According to a second aspect of the present disclosure, a corresponding method of producing a tamper detection device is conceived.

Inventory control system with integrated ID tags
11508226 · 2022-11-22 · ·

The inventory control system process includes steps for printing a circuit to a sheet stock having at least one ID tag formed therewith such that the circuit is carried by the ID tag, assigning a unique identification code to the circuit associated with the ID tag, removing the ID tag carrying the circuit from the sheet stock, associating the removed ID tag with a product, and entering the product into an inventory control system secured in connection with a user account accessible only by an authorized user associated with the user account, for real-time location tracking of the product thereof by way of the circuit.

Internal power generating circuit for EAS hard tags
11263882 · 2022-03-01 · ·

In an aspect, the present disclosure includes a method, apparatus, and system for operating a security tag, comprising activating a piezo-electric component of the security tag to generate an electrical charge in response to an applied mechanical force on the security tag; determining whether a verification signal has been received by the security tag upon activating the piezo-electric component; and disengaging a mechanical component of the security tag based on a determination that the verification signal has been received.

Pin alarm tag

An alarm tag comprising a first input unit for generating signals for setting (to ON) or resetting (to OFF) an alarm system of the alarm tag. The alarm tag further includes a second input unit for generating signals for arming the alarm tag and triggering an alarm, and an independent auxiliary input unit that generates independent signals that arm the alarm tag and trigger an alarm. When both the second and the auxiliary input units generate a first signal, the alarm system of the alarm tag is armed and set to ON, and when any of the second and third auxiliary input units generate a second signal while the alarm tag is armed and ON, the alarm system of the alarm tag triggers an alarm, thereby preventing tampering and bypassing of one of the second and auxiliary input units to disarm the alarm.

Gateway-Based Anti-Theft Security System and Method

Improved systems and techniques are disclosed for controlling the security states of anti-theft security systems such as product display assemblies using security fobs. The tasks relating to fob authentication are offloaded to a computer system, and these authentications can be based on identifiers for the different security fobs. The interactions between security fobs and product display assemblies can be consistent regardless of the population of authorized security fobs by using a security code that is shared by the security fobs. When attempting to use a security fob to change a security status for a product display assembly, the provision of the code to the subject product display assembly can be predicated on authorization of the subject security fob by the computer system. The computer system can maintain a list of identifiers for authorized security fobs that is easily updated when new security fobs are added to or existing security fobs are de-authorized from the system.

INVENTORY CONTROL SYSTEM WITH INTEGRATED ID TAGS
20220270457 · 2022-08-25 ·

The inventory control system process includes steps for printing a circuit to a sheet stock having at least one ID tag formed therewith such that the circuit is carried by the ID tag, assigning a unique identification code to the circuit associated with the ID tag, removing the ID tag carrying the circuit from the sheet stock, associating the removed ID tag with a product, and entering the product into an inventory control system secured in connection with a user account accessible only by an authorized user associated with the user account, for real-time location tracking of the product thereof by way of the circuit.

Gateway-based anti-theft security system and method

Improved systems and techniques are disclosed for controlling the security states of anti-theft security systems such as product display assemblies using security fobs. The tasks relating to fob authentication are offloaded to a computer system, and these authentications can be based on identifiers for the different security fobs. The computer system can maintain a list of identifiers for authorized security fobs that is easily updated when new security fobs are added to or existing security fobs are de-authorized from the system.

NOVEL SMART ANTI-THEFT TAG WITH QUADRUPLE ALARM FUNCTION

Embodiments described herein relate to an anti-theft device. Some embodiments comprise a cover seat which is provided with an acoustomagnetic coil and a circuit board and formed with a guide slot, an arm hook which is a curved hook and has a long arm movably inserted into the guide slot, a plug which is mounted on the cover seat and used to lock the arm hook in a moving state, and a cable which is mounted at one end of the cover seat, penetrates through a YETI® vacuum cup and is electrically connected to the circuit board, wherein a monitoring assembly for protecting the tag against damage is mounted on the tag and comprises a Hall® switch arranged on the circuit board and magnetic steel arranged on a short arm of the arm hook.

BOOT WIRE WRAP EAS TAG
20220130221 · 2022-04-28 ·

A security tag assembly for placing around a boot, including a circuit board having a processor, and one or more wires electrically connected to the circuit board that form a first opening and a second opening. The first and second openings are respectively configured to receive first and second components of the boot. The assembly further includes a tension switch connected to the one or more wires and having a closed position corresponding to a first tension level on the one or more wires and an open position corresponding to a second tension level on the one or more wires, wherein the second tension level is greater than the first tension level. Further, the processor is configured to monitor whether the tension switch is in at least the open position, wherein the processor is configured to trigger an alarm in response to the switch being in the open position.

Gateway-based anti-theft security system and method

Improved systems and techniques are disclosed for controlling the security states of anti-theft security systems such as product display assemblies using security fobs. The tasks relating to fob authentication are offloaded to a computer system, and these authentications can be based on identifiers for the different security fobs. The interactions between security fobs and product display assemblies can be consistent regardless of the population of authorized security fobs by using a security code that is shared by the security fobs. When attempting to use a security fob to change a security status for a product display assembly, the provision of the code to the subject product display assembly can be predicated on authorization of the subject security fob by the computer system. The computer system can maintain a list of identifiers for authorized security fobs that is easily updated when new security fobs are added to or existing security fobs are de-authorized from the system.