Patent classifications
G08B13/2454
Theft prevention for returned merchandise
Consistent with disclosed embodiments, systems, methods, and computer readable media for electronic security systems for preventing theft of returned goods may be provided. Embodiments may include an electronic article surveillance (EAS) gate in an establishment and at least one receiver configured to receive transmissions from wirelessly transmitting tags. Embodiments may also include at least one processor configured to receive, from a mobile communications device associated with a previous purchaser, a notification of intent to return a previously purchased product to the establishment; identify a unique tag ID of a specific wirelessly transmitting tag associated with the previously purchased product; update a data structure to indicate that the previously purchased product was returned to the establishment; and enable an ability to initiate an alarm when the at least one receiver receives a transmission from the specific tag associated with the previously purchased product in proximity to the EAS gate.
SECURITY SYSTEM AND SECURITY TAG ASSEMBLY
A security system and security tag assembly cooperatively operative to restrict unauthorized removal of an article from an area, wherein the security tag assembly is removably attached to the article and includes an RFID component/label configured to encode and retain data associated with the article to which it is attached. A deactivator assembly includes a read component structured to read the article data encoded in the security tag assembly, before or during removal of the tag assembly, wherein the read data is transmitted to a processor for display, storage and/or supplementary processing. One or more portable readers, not associated with the deactivator assembly or processor, are configured to access and display the article data for authorized article control. A review application may be downloaded on communication devices having short range technology and is configured to access the article data to obtain information relating thereto.
Theft sensing system for fusion splicer device and fusion splicer device
Disclosed is a theft sensing system for sensing a theft of a fusion splicer by using an information terminal. The system includes a wireless communication unit that enables the fusion splicer to perform wireless communication with the information terminal, an authentication processing unit that performs an authentication process such that the fusion splicer and the information terminal are wirelessly connected to each other, an acquisition unit that acquires wireless situation data between the fusion splicer and the information terminal which are wirelessly connected to each other, a decision unit that decides whether the fusion splicer moves in a direction away from the information terminal based on a change in the wireless situation data acquired by the acquisition unit, and a notification unit that performs a predetermined notification process in the information terminal when the decision unit decides that the fusion splicer moves in the direction away from the information terminal.
PACKAGE ROOM SYSTEMS AND METHODS
A package room system may include at least one shelf, at least one sensor configured to sense items on the at least one shelf, at least one data entry device, and at least one computer coupled to the at least one sensor and the at least one data entry device. The at least one computer may be configured to receive data concerning a package from the at least one data entry device, detect, from data from the at least one sensor, a location of the package on the at least one shelf, notify a recipient of receipt of a presence of the package and the location of the package, and detect, from data from the at least one sensor, removal of the package from the at least one shelf.
Remote trigger for security system
Systems, methods, and techniques for mitigating retail theft include securing items at a receptacle of a retailer via an electronic lock, and providing a transceiver that is proximate to the secured items and that transmits a beacon which may be detected by a personal electronic device (PED) of a customer. Based on a wireless transmission between the PED and the transceiver, a customer's identity may be determined and the customer's risk profile may be accessed. A risk score corresponding to the customer accessing the secured item may be determined based on the customer's risk profile and optionally based upon a profile of the secured item. If the risk score is indicative of an acceptable risk, a trigger to remotely unlock the electronic lock may be sent, thereby remotely and automatically allowing qualified customers to access secured items. An item's removal may be detected and tracked.
DETECTING FALLS USING A MOBILE DEVICE
In an example method, a mobile device obtains a signal indicating an acceleration measured by a sensor over a time period. The mobile device determines an impact experienced by the user based on the signal. The mobile device also determines, based on the signal, one or more first motion characteristics of the user during a time prior to the impact, and one or more second motion characteristics of the user during a time after the impact. The mobile device determines that the user has fallen based on the impact, the one or more first motion characteristics of the user, and the one or more second motion characteristics of the user, and in response, generates a notification indicating that the user has fallen.
Mobile EAS alarm response proximity enforcement using wireless technologies
Systems and methods for responding to an Electronic Article Surveillance (“EAS”) alarm's issuance. The methods involve: receiving, by a mobile device, a short range communication signal from a fixed device located in proximity to EAS equipment issuing the EAS alarm; automatically transitioning an operational mode of the mobile device from a first operational mode in which alarm response functions are disabled to a second operational mode in which alarm response functions are enabled, in response to the short range communication signal's reception; receiving, by the mobile device, a user input for inputting a reason code specifying a reason for the EAS alarm's issuance; and communicating the reason code from the mobile device to an external device for causing a deactivation of the EAS alarm's issuance.
TRUSTED MONITORING SYSTEM AND METHOD
Methods and apparatus for monitoring remotely located objects with a system including at least one master data collection unit, remote sensor units, and a central data collection server are described. The master unit is configured to monitor any object, mobile or stationary, including monitoring multiple remote sensor units associated with the monitored objects. The master unit may be in a fixed location or attached to a mobile object. The master unit is configured for monitoring objects that enter and leave an area. The master unit may act as a parent controller for one or more child devices including remote sensors or monitors of measurable conditions including environmental conditions, substance identification, product identification, and/or biometric identification. The master unit may discover remote sensor units as they enter or leave the area where the master unit is located. The master unit can be remotely reprogrammed such as with authenticated instructions.
POWERED SECURITY APPARATUS
A security apparatus comprises a body comprising a first guide and a second guide extending along a guide axis and positioned at opposing side of the body, a first holder moveably coupled to the first guide, and a second holder moveably coupled to the second guide. The security apparatus further comprises an actuator, and at least one driver operatively coupled to the actuator and positioned along the guide axis. The driver is connected to the first holder and the second holder. A controller is in communication with the actuator and comprises a controller input, wherein in response to an authorized input, the actuator is configured to drive the driver to move the first holder along the first guide and to move the second holder along the second guide.
Building system with sensor-based automated checkout system
Example aspects include a method, a system, and a non-transitory computer-readable medium for operating an automated checkout system to be performed by a processing circuit, comprising determining a user account associated with a shopper. The aspects further include receiving, from a sensor, a first indication that an object passed through a location of a building. The first indication having been generated based on a tag coupled with the object. The sensor being configured to detect characteristics of objects. The sensor being located at the location of the building. The aspects further include receiving, from the sensor, a second indication that the shopper associated with the user account passed through the location. Additionally, the aspects further include associating the object with the user account based on the first indication and the second indication.