G08B13/246

SYSTEM FOR MONITORING AND CONTROLLING SHOPPING CART USAGE
20230057163 · 2023-02-23 ·

A system for monitoring and controlling shopping cart usage comprises a wheel assembly that attaches to a shopping cart. In some embodiments the wheel assembly includes a wheel, a brake that can be activated to inhibit rotation of the wheel, a controller that controls the brake, a VLF receiver, and an RF transceiver. The RF transceiver may, for example, operate in a 2.4 GHz frequency band. In some implementations, the RF transceiver may be used to detect entry of the shopping cart into a checkout area of the store, and the VLF receiver may be used to detect that the shopping cart is exiting the store. The controller may activate the brake if the shopping cart attempts to exit the store without first passing through a checkout area.

Device and Method of Tracking an Event
20220369063 · 2022-11-17 ·

A mobile equipment (ME) for tracking an event comprises at least one storage device; and at least one processing circuit, coupled to the at least one storage device. The at least one storage device stores instructions, and the at least one processing circuit is configured to execute the instructions of: activating a digital tag of the event in the ME, to track the event; and generating an indication on the ME according to the digital tag, when a distance between a first position of the ME and a second position at which the event occurs is greater than a threshold.

TAG SYSTEM WITH A MODULATOR OF AN ANTENNA MODULATOR AND METHODS OF USE
20220327295 · 2022-10-13 ·

Systems and methods for operating a tag system. The methods comprising: emitting a wireless signal from an antenna of the tag with a first signal characteristic when the tag is proximate to an active antenna modulation marker; changing an impedance of a sensor from a first impedance value to a second impedance value when the active antenna modulation marker is exposed to a stimulus; and emitting a wireless signal from the antenna of the tag with a second signal characteristic when the tag is proximate to the active antenna modulation marker and the sensor has the second impedance value.

Methods and apparatuses for removing a security tag

Aspects of the present disclosure include methods, systems, and non-transitory computer readable media for receiving a confirmation signal to unlock the security tag from being locked to a merchandise, transmitting a RFID signal to the RFID device associated with the security tag to enable a controller to receive a release signal used to unlock the security tag from the merchandise, and transmitting the release signal to the controller to unlock the security tag from the merchandise.

DEVICE, SYSTEM AND METHOD FOR SECURING AN ITEM

A method for a secured purchase process. The method may include encoding a device with a unique identification code related to a specific item, attaching the device to the item by a locking mechanism included in the device, receiving, by a receiver included in the device, a signal upon a completion of a payment transaction related to the unique identification code, enabling an unlocking movement of the locking mechanism upon receipt of the signal, and unlocking the locking mechanism to enable releasing the device from the item.

Tag system with a modulator of an antenna modulator and methods of use

Systems and methods for operating a tag system. The methods comprising: emitting a wireless signal from an antenna of the tag with a first signal characteristic when the tag is proximate to an active antenna modulation marker; changing an impedance of a sensor from a first impedance value to a second impedance value when the active antenna modulation marker is exposed to a stimulus; and emitting a wireless signal from the antenna of the tag with a second signal characteristic when the tag is proximate to the active antenna modulation marker and the sensor has the second impedance value.

INDUCTION-BASED DATA IDENTIFICATION SYSTEM CHARACTERIZED BY REAL-TIME RESPONSE

The present invention provides an induction-based data identification system characterized by real-time response, including: a plurality of mobile identity terminals that can be carried, a gateway system and a background computer. The system configuration and method process of the invention are reasonable; it has both the features of recording any update status data of the objects and real-time response without affected by large amount of information; in addition, the mobile identity terminal has a low power consumption, suitable for the occasions of long-time use, such as anti-theft systems of shopping malls, places of detention, warehouse management, etc.

Electronic article surveillance

The present invention discloses a point of sale (POS) structure that is includes an Electronic Article Surveillance (EAS) system.

AN ARRANGEMENT AND METHOD FOR FITTING ROOMS
20170342731 · 2017-11-30 · ·

An arrangement and a method for observing fitting rooms (100) and/or fitting areas (200), wherein following steps are performed in the method: detecting number, type, size and/or colour of products brought to the fitting room and/or fitting area by detecting presence of remotely readable identification tags, electronic article surveillance tags and/or electronic price labels in the fitting room and/or fitting area (200) and reading product information linked to the remotely readable identification tag, electronic article surveillance tag and/or electronic price label, comparing detected number, type, size and/or colour of products to predefined criteria, the criteria relating to the number, type, size and/or colour of products, and generating an alarm based on the detected number, type, size and/or colour of products if at least one predefined criterion is fulfilled.

Method and apparatus for detecting suspicious activity using video analysis

A system detects a transaction outcome by obtaining video data associated with a transaction area and analyzing the video data to obtain at least one video transaction parameter concerning transactions associated with the transaction area. The transaction area can be a video count of items indicated in the video data as detected by an automated item detection algorithm applied to the video data. The system obtains at least one expected transaction parameter concerning an expected transaction that occurs in the transaction area, such as a scan count of items scanned at a point of sale terminal. The system automatically compares the video transaction parameter(s) to the expected transaction parameter(s) to identify a transaction outcome that may indicate fraudulent activity such as sweethearting in a retail environment.