G08B13/2462

APPARATUS, SYSTEMS AND METHODS FOR ENHANCED VISUAL INSPECTION OF VEHICLE INTERIORS
20170372143 · 2017-12-28 ·

Devices, systems, and methods enhance the inspection of internal areas and occupants of vehicles, and can employ one or more high-resolution cameras, one or more auxiliary illumination devices and a related computer system. According to various embodiments, an auxiliary illumination device can be synchronized to one or more cameras, and configured to supply auxiliary illumination to facilitate capture of accurate and usable images. Advanced image processing solutions assist with identifying individuals inside a vehicle, removing light glare and undesired reflections from a window surface, and capturing an image through a tinted window, among other things. Further, embodiments can compare a captured image to an authenticated image from a database, so as to confirm the identity of a vehicle occupant.

SYSTEMS AND METHODS FOR POSITIONING ASSETS OVER A WIRELESS NETWORK
20230206740 · 2023-06-29 ·

Systems and methods for positioning assets over a wireless network are provided. In one embodiment, the method comprises scheduling, at a scheduling entity communicatively coupled to the wireless network, a ranging time to execute a plurality of ranging events between a participating tag associated with a designated asset and selected from a plurality of tags, and each participating anchor of a plurality of participating anchors selected from the plurality of anchors; sending, from the scheduling entity, to the participating tag and to each participating anchor, a corresponding ranging message comprising the ranging time for each ranging event and a list identifying said participating tag and said each of the participating anchors; executing at the ranging time, each ranging event of the plurality of ranging events to produce a corresponding ranging information; and calculating, at a positioning engine a position of said participating tag and said designated asset.

Radio frequency identification (RFID) tag location verification using short range communication

An EAS system first transmits, over a time, a radio frequency identification (RFID) interrogation signal into an RFID interrogation zone of an EAS system. The system then first receives at least one RFID response signal from a first RFID tag of the system responding to the interrogation signal. The system second transmits, over a second time overlapping at least in part with the first time, a non-RFID RF signal into a second zone. The second zone and the RFID interrogation zone overlap to form a zone of interest. The system second receives, from the first RFID tag, an indication that the first RFID tag received the second transmission. The system determines, based on receiving both the RFID response signal from a first RFID tag and the indication that the first RFID tag received the second transmission, that the first RFID tag is in the zone of interest.

User Intervention Based on Proximity Between Tracking Devices

A tracking system can provide intervention notifications to a user to notify the user that a tracking device is potentially lost or is in a predicted state. The tracking system may notify the user that a tracking device is potentially lost or in a predicted state based on a number of factors, including: a proximity of a tracking device to other tracking devices or a user's mobile device, a movement of a tracking device to more than a threshold distance away from a mobile device or other tracking devices, a location of a tracking device relative to a geographic location or to geographic boundaries, a usage or movement behavior of the tracking device, a usage or movement behavior of a user or owner of a tracking device, information received from an external source, or information received from sensors within the tracking device or a user's mobile.

Security Tracking Device With Zone-Based Alert Suppression

A method of triggering a security alert using a tracking device, including detecting motion using a motion sensor of the tracking device, determining that the detected motion meets a motion threshold, detecting one or more wireless access points in proximity to the tracking device, determining that the one or more wireless access points do not correspond to a recognized wireless access point, and in accordance with the determination that the one or more detected wireless access points do not correspond to a recognized wireless access point, triggering a security alert.

Security tag for inventory and anti-theft alarm system
09836934 · 2017-12-05 · ·

The disclosed technology relates to a security tag. The security tag can include a tamper assembly having a clutch assembly capable of affixing the security tag to a merchandise item and a locking device for inserting into the clutch mechanism. An insertion of the locking device into the clutch mechanism causes a transmission of a closed signal indicating a closed status for the security tag, and a displacement of the locking device causes a transmission of an open signal indicating an open status for the security tag.

SMART GARMENT THAT COMMUNICATES AT LEAST ONE PARAMETER TO A RECEIVER

Sensor data generated by a plurality of sensors integrated into the smart garment can be received by a processor integrated into a smart garment. Based on the sensor data, the processor can generate at least one parameter indicating a manner in which the smart garment is worn. A transmitter integrated into the smart garment can communicate to a receiver the at least one parameter indicating the manner in which the smart garment is worn.

Validating radio frequency identification (RFID) alarm event tags

An RFID portal of an EAS system first interrogates a first zone extending into a controlled area beyond a threshold distance from an interrogating antenna of the portal. The portal defines an exit from the controlled area, the threshold distance being less than a width of the exit. The portal first detects, in response to the first interrogating, a first response of a particular RFID tag. The portal second interrogate, subsequent to the first detecting, in a second zone extending into the controlled area at least to the threshold distance. The portal second detects, in response to the second interrogating, at least one second response of the particular RFID tag indicating a received signal strength of the second interrogating at the particular RFID tag corresponding to a distance from an interrogating antenna of the portal less than the threshold distance. The EAS system alarms in response to the second detecting.

Real-time location and alert system

A device, method, and system for providing initial and on-going tracking and location information in real-time for individuals and items within a predetermined area. A plurality of tracking devices are connected to at least one remote server. The remote server provides geofencing and location of all tracking devices within a pre-configured physical area. The tracking devices provide real-time location updates to the at least one remote server including proximity information to established physical locations within the physical area. The tracking devices are also operable to provide transactional and personal information to the at least one remote server.

Inventory control system with integrated ID tags
11508226 · 2022-11-22 · ·

The inventory control system process includes steps for printing a circuit to a sheet stock having at least one ID tag formed therewith such that the circuit is carried by the ID tag, assigning a unique identification code to the circuit associated with the ID tag, removing the ID tag carrying the circuit from the sheet stock, associating the removed ID tag with a product, and entering the product into an inventory control system secured in connection with a user account accessible only by an authorized user associated with the user account, for real-time location tracking of the product thereof by way of the circuit.