G08B13/2434

Mobile device case for secured access and improvements
11520942 · 2022-12-06 · ·

Mobile device cases are provided which, in a first embodiment, selectively limit a user's ability to control the user's own mobile electronic device. The case includes front and rear portions joined together and defining therein an opening for receiving a mobile electronic device, such as a mobile phone. A locking mechanism is provided for selectively securing the opening in a first locked position to prevent operational access to the mobile electronic device by the user until a predetermined condition is met. The case includes an indicia of time visible to the user during the period of time of prevented operational access. In a further embodiment, a case is provided with first and second polymeric shells each having an interior and an exterior surface thereon and connected together by at least one hinge portion. The first and second shell portions form a cavity of sufficient size to cover a mobile electronic device sufficiently to prevent access by its user. Tamper resistant and ultrasonic sensor defeating mobile device case embodiments are also contemplated by this invention.

SYSTEM FOR MONITORING AND CONTROLLING SHOPPING CART USAGE
20230057163 · 2023-02-23 ·

A system for monitoring and controlling shopping cart usage comprises a wheel assembly that attaches to a shopping cart. In some embodiments the wheel assembly includes a wheel, a brake that can be activated to inhibit rotation of the wheel, a controller that controls the brake, a VLF receiver, and an RF transceiver. The RF transceiver may, for example, operate in a 2.4 GHz frequency band. In some implementations, the RF transceiver may be used to detect entry of the shopping cart into a checkout area of the store, and the VLF receiver may be used to detect that the shopping cart is exiting the store. The controller may activate the brake if the shopping cart attempts to exit the store without first passing through a checkout area.

Security Device with Activation Backing
20230059956 · 2023-02-23 ·

A security device includes a plunger switch with a plunger that moves to extend through an aperture in the housing and a removable protective backing coupled to an adhesive pad that initially maintains the plunger in the depressed position and the security device in an inventory state. In the inventory state, processing circuitry of the security device is configured to take no action in response to a deactivator sensor detecting a deactivator sign. The processing circuitry being configured to control operation of a sounder based on a current state of the processing circuitry and signaling from the plunger switch.

Device and Method of Tracking an Event
20220369063 · 2022-11-17 ·

A mobile equipment (ME) for tracking an event comprises at least one storage device; and at least one processing circuit, coupled to the at least one storage device. The at least one storage device stores instructions, and the at least one processing circuit is configured to execute the instructions of: activating a digital tag of the event in the ME, to track the event; and generating an indication on the ME according to the digital tag, when a distance between a first position of the ME and a second position at which the event occurs is greater than a threshold.

MOBILE DEVICE CASE FOR SECURED ACCESS AND IMPROVEMENTS
20230052605 · 2023-02-16 ·

Mobile device cases are provided which, in a first embodiment, selectively limit a user's ability to control the user's own mobile electronic device. The case includes front and rear portions joined together and defining therein an opening for receiving a mobile electronic device, such as a mobile phone. A locking mechanism is provided for selectively securing the opening in a first locked position to prevent operational access to the mobile electronic device by the user until a predetermined condition is met. The case includes an indicia of time visible to the user during the period of time of prevented operational access. In a further embodiment, a case is provided with first and second polymeric shells each having an interior and an exterior surface thereon and connected together by at least one hinge portion. The first and second shell portions form a cavity of sufficient size to cover a mobile electronic device sufficiently to prevent access by its user. Tamper resistant and ultrasonic sensor defeating mobile device case embodiments are also contemplated by this invention.

System and method for collecting and returning luggage at public transportation systems

Disclosed are a system and a method for collecting and returning luggage at public transportation systems. The method includes storing characteristic features and metadata corresponding to a luggage and its individual owner, and associating a color while collecting the luggage at a luggage submitting terminal. The luggage may be easily identified at a luggage providing terminal, using an identification tag attached to the luggage and the associated metadata (including the associated colour). Upon an end of journey, the individual may be allowed to pick the luggage upon providing a handshake signal. In case the handshake signal is not provided and the individual owner's metadata is not matched, security agencies may be alerted about picking of the luggage by another individual.

PRODUCT ANTI-THEFT SYSTEM AND METHOD FOR OPERATING A PRODUCT ANTI-THEFT SYSTEM
20230102380 · 2023-03-30 · ·

Disclosed is a product anti-theft system having a product anti-theft device configured to be attached to a product to be secured, the anti-theft device having a housing with a connecting portion designed to be connected to the product to be secured and a locking mechanism associated with the connecting portion and having a secured state and a released state. The anti-theft system further includes a release device for transmitting a release signal that triggers transferring of the locking mechanism from the secured state to the released state. Also disclosed is a method of operating an anti-theft device.

DEVICE FOR AUTOMATED REMOVAL OF SECURITY TAGS AND ASSOCIATED SYSTEMS AND METHODS

Devices, systems, and methods for removing a security tag from an article are disclosed herein. A device for removing a security tag includes a housing including an opening positioned to receive the tag and at least a portion of the article. A magnet is supported adjacent the opening to retain a tag body and to release a retainer pin therefrom when the tag is inserted into the opening. A pin retractor is positioned in the housing opposite the magnet to capture the retainer pin and retract it from the tag body. The pin retractor is retracted into a collar to strip the pin from the pin retractor. A release frame is positioned proximate the magnet and movable between a first position wherein the magnet retains the tag body, and a second position wherein the tag body is moved away from the magnet, thereby releasing the tag body from the magnet.

Dual function strap for resonating elements and ultra high frequency antennas

A combined EAS and RFID circuit includes an HF coil antenna, a UHF tuning loop, and an RFID chip coupled to a strap that includes a first coupling area and a second coupling area. The coil ends of the HF coil antenna are configured to capacitively and/or conductively couple to one or both of the first coupling area or second coupling area of the strap. The HF coil antenna can include a gap between turns for non-interfering placement of the UHF tuning loop. The EAS circuit can be deactivating upon application of a field at the resonant frequency of sufficient intensity to cause the breakdown voltage to be exceeded between a coil end and coupling area. The threshold breakdown voltage between a coil end and a coupling area can be reduced by laser ablation treatment of a conductive surface of one or both of the coil end or coupling area.

Boot wire wrap EAS tag

A security tag assembly for placing around a boot, including a circuit board having a processor, and one or more wires electrically connected to the circuit board that form a first opening and a second opening. The first and second openings are respectively configured to receive first and second components of the boot. The assembly further includes a tension switch connected to the one or more wires and having a closed position corresponding to a first tension level on the one or more wires and an open position corresponding to a second tension level on the one or more wires, wherein the second tension level is greater than the first tension level. Further, the processor is configured to monitor whether the tension switch is in at least the open position, wherein the processor is configured to trigger an alarm in response to the switch being in the open position.