G08B13/246

Validating radio frequency identification (RFID) alarm event tags

An RFID portal of an EAS system first interrogates a first zone extending into a controlled area beyond a threshold distance from an interrogating antenna of the portal. The portal defines an exit from the controlled area, the threshold distance being less than a width of the exit. The portal first detects, in response to the first interrogating, a first response of a particular RFID tag. The portal second interrogate, subsequent to the first detecting, in a second zone extending into the controlled area at least to the threshold distance. The portal second detects, in response to the second interrogating, at least one second response of the particular RFID tag indicating a received signal strength of the second interrogating at the particular RFID tag corresponding to a distance from an interrogating antenna of the portal less than the threshold distance. The EAS system alarms in response to the second detecting.

Theft prevention for returned merchandise

Consistent with disclosed embodiments, systems, methods, and computer readable media for electronic security systems for preventing theft of returned goods may be provided. Embodiments may include an electronic article surveillance (EAS) gate in an establishment and at least one receiver configured to receive transmissions from wirelessly transmitting tags. Embodiments may also include at least one processor configured to receive, from a mobile communications device associated with a previous purchaser, a notification of intent to return a previously purchased product to the establishment; identify a unique tag ID of a specific wirelessly transmitting tag associated with the previously purchased product; update a data structure to indicate that the previously purchased product was returned to the establishment; and enable an ability to initiate an alarm when the at least one receiver receives a transmission from the specific tag associated with the previously purchased product in proximity to the EAS gate.

MANAGING INTERACTIONS OF PRODUCTS AND MOBILE DEVICES

Sensors may detect a user's locations and interest level of a product. Based on the interest level, messages may be sent to a server in order to obtain information, such as location, about a category of products and further display the obtained information to a mobile device.

SECURITY SYSTEM AND SECURITY TAG ASSEMBLY
20170330435 · 2017-11-16 ·

A security system and security tag assembly cooperatively operative to restrict unauthorized removal of an article from an area, wherein the security tag assembly is removably attached to the article and includes an RFID component/label configured to encode and retain data associated with the article to which it is attached. A deactivator assembly includes a read component structured to read the article data encoded in the security tag assembly, before or during removal of the tag assembly, wherein the read data is transmitted to a processor for display, storage and/or supplementary processing. One or more portable readers, not associated with the deactivator assembly or processor, are configured to access and display the article data for authorized article control. A review application may be downloaded on communication devices having short range technology and is configured to access the article data to obtain information relating thereto.

Information processing apparatus, information processing system, information processing method, and information processing program
11263613 · 2022-03-01 · ·

According to an embodiment, an information processing apparatus, comprises a database configured to store a first list of commodities determined as having been removed from a store display shelf and a second list of commodities registered by a customer in a sales transaction using a mobile terminal. A processor is configured to detect that a commodity has been removed from a store display shelf based on entry of the commodity on the first list, detect a registration of the commodity by the customer in the sales transaction based on entry of the commodity on the second list, and measure an elapsed time from the time of detecting that the commodity has been removed from the store display shelf. When the elapsed time exceeds a threshold value without the registration of the commodity being detected, the processor causes an output of warning notification information.

Camera system monitor for shopping cart bottom shelf

A method apparatus are directed to identify items disposed on the bottom shelf of a shopping cart bottom of basket (BoB). Certain aspects envision a distance measurement sensor and computing system connected to the shopping cart. A first set of distance measurements of the bottom shelf when empty is obtained via the distance measurement sensor. Next, at a checkout stand, a second set of distance measurements of the shelf are taken, which can be used to compare with the first set of distance measurements to identify if there is an object on the BoB. An alert can be provided to a checkout attendant if there is an object on the BoB.

Internal power generating circuit for EAS hard tags
11263882 · 2022-03-01 · ·

In an aspect, the present disclosure includes a method, apparatus, and system for operating a security tag, comprising activating a piezo-electric component of the security tag to generate an electrical charge in response to an applied mechanical force on the security tag; determining whether a verification signal has been received by the security tag upon activating the piezo-electric component; and disengaging a mechanical component of the security tag based on a determination that the verification signal has been received.

ELECTRONIC ARTICLE SURVEILLANCE (EAS) ASSEMBLY INSTALLABLE IN PRODUCT PROCESSING WORKSTATION, AND METHOD OF INSTALLATION
20170301204 · 2017-10-19 ·

An electronic article surveillance (EAS) assembly is installable in a workstation that processes products associated with targets to be electro-optically read. The assembly includes a radio frequency (RF) antenna having a pair of RF feed lines and a conductive loop for generating an electromagnetic field to deactivate EAS tags associated with the products to be processed, and a protective carrier for supporting and protecting the antenna during the installation in a predetermined position in the workstation.

Security System for a Retail Environment
20170287297 · 2017-10-05 ·

A security system for deployment within a retail environment is shown. First tags (108 to 112) are concealed within an item of merchandise. Each of these first tags is configured to transmit a first signal modulated to specify a unique first tag code in response to being energised at an exit gate. Second tags (113 to 117) are each independently attached to the merchandise and are configured to communication with mobile devices to facilitate the purchase of the items. A data communication apparatus (119) communicates with mobile devices and controls responses of an exit gate when detecting output signals from the first tags. User selected tags transmit second output signals to a mobile device in response to respective user interactions, with each for the second output signals being modulated by a unique second code. The mobile devices relay received second codes to the communication system. The communication system returns product data for selected second tags, including a graphical representation of each selected item. Mobile devices are configured to dynamically display graphical representations of selected items. In addition, they are configured to dynamically position the graphical representations in response to positional data identifying a relative position of each of the selected items and further communicate with the communication system to initiate a sale of a preferred item chosen from the displayed selected items. The data communication apparatus controls exit gates so as not to raise an alarm in response to detecting a respective first tag concealed within a purchased item.

Alarming smart magnetic tag

Systems and methods for operating a security tag (132, 300). The methods comprise: wirelessly receiving at the security tag a signal sent from a remote device (104, 190); and preventing alarm issuance when first and second Magnetic Attracting (“MA”) halves (302, 312, 702, 704) of the security tag are pulled apart by deactivating alarm circuitry (264, 340) internal to the security tag in response to the security tag's reception of the signal.