Patent classifications
G08B13/248
RADIO FREQUENCY IDENTIFICATION (RFID) TAG LOCATION VERIFICATION USING IMAGE DATA
Electronic Article Surveillance in which a radio frequency identification (RFID) interrogation signal is transmitted, over a first window of time, into an RFID interrogation zone of the EAS system. A plurality of response signals are detected from a first RFID tag of the EAS system responding to the interrogation signal. Over a second window of time overlapping at least in part with the first window of time, image data is captured within a field of view. The field of view and the RFID interrogation zone overlap to form a zone of interest. Movement of a non-tag object is characterized during the first window of time based on the image data. Whether the first RFID tag is associated with the characterized non-tag object is determined based on a comparison of the detected plurality of response signals and the characterized movement of the non-tag object.
Methods and apparatuses for detecting an unauthorized RF device
Aspects of the present disclosure include methods, systems, and non-transitory computer readable media for identifying one or more authorized signal characteristic associated with at least one authorized RF signal, receiving at least one incoming RF signal having one or more incoming signal characteristic, identifying the one or more incoming signal characteristic, determining a presence of the unauthorized RF device based on at least one of the one or more authorized signal characteristic or the one or more incoming signal characteristic, and activating an alarm in response to determining the presence of the unauthorized RF device.
SOLAR PANEL EFFICIENCY AND SECURITY MONITORING DEVICE
A system for monitoring efficiency and security of a solar array includes a voltage-based monitoring circuit and a photoelectric sensor. The system detects a voltage across the solar array and compares the voltage to changes in light detected by the photoelectric sensor. In response to reduced light detected at the photoelectric sensor, the system generates a low-efficiency alarm. In response to reduced voltage while light detected by the photoelectric sensor remains constant, the system generates a security alarm signal. The system may also include a PIR sensor, an RFID reader, and a solar panel circuit including the solar panels of the solar array. In response to an infrared alarm at the PIR sensor, an unauthorized alarm at the RFID reader, and an open circuit alarm signal of the solar panel circuit, and the security alarm signal, the system may transmit a master alarm to a monitoring center.
DOORBELL COMMUNICATION SYSTEMS AND METHODS
The disclosure includes a doorbell system having a doorbell, a doorbell housing, a visitor detection system, and a chime. The visitor detection system can be coupled to the doorbell housing and can include at least one of a camera and a motion detector. The doorbell can also comprise a first low-energy transceiver and a first high-energy transceiver that can be coupled to the doorbell housing. The first and second low-energy transceivers and the first and second high-energy transceivers can be configured to transmit data.
Person monitoring system and person monitoring method
There is provided a person monitoring system including at least one camera and a server that is communicably connected to the at least one camera. The server, based on reception of detection information of a predetermined event from a gate that regulates passage in response to a detection of the predetermined event, requests a first camera, that captures an image of a capturing area including the gate, for a face image of a person near the gate when the predetermined event occurs. The first camera captures an image of the person near the gate when the predetermined event occurs and transmits, to the server, a face image obtained by cutting out a range having a face of the person from the image of the person. The server outputs alarm information based on the face image and register the face image in a database.
Validating radio frequency identification (RFID) tag alarm events
In an Electronic Article Surveillance (EAS), a radio frequency identification (RFID) subsystem of an EAS system, can detect a presence of an RFID tag in an RFID interrogation zone associated with a boundary of a controlled area. The EAS system can first determine that the RFID tag is not authorized to leave the controlled area across the boundary. A radar subsystem of the EAS system can second determine, within a first window of time around the first detecting, whether an object in motion is associated with the boundary. The EAS system can alarm based upon both determining that the RFID tag is not authorized to leave the controlled area and determining that the object in motion is associated with the boundary.
Method and Apparatus for Saving System Power
Theft increases the average product cost to consumers. A mentoring system is presented that can help to reduce or prevent the inventory from lost or theft. Theft is a serious concern in the consumer market place. Industry loses billions per year on theft of merchandise. According to a Reuters report, last year, thefts by employees of U.S. retail merchandise accounted for $15.9 billion, or 44 percent of theft losses at stores, more than shoplifting and vendor fraud combined. Thus, the total thief by the customers and store employees during the year 2008 amounted to $36 billion. Several embodiments of ways to control or reduce the thefts in the market place are presented.
SMART ALARM MANAGEMENT
A security alarm management system and method includes a reader device, a person counter, and an alarm. The reader device reads security tags within a range of the reader. The person counter detects people passing through a point of entry. The person counter can determine a direction of travel of people passing through the point of entry. A white-list includes entries or product identifiers that will not trigger an alarm. The alarm is triggered if conditions associated with the reader device, person counter, and white-list are met.
Systems and methods for determining an inventory using a hybrid lighting and inventory system
Systems and methods for determining an inventory. The methods comprise: performing operations by an internal circuit of a light provider to control operations of a light element to produce visible light, where the light provider is coupled to a light fixture installed on a physical structure of a facility; and performing operations by the internal circuit to connect with a network, receive a tag identifier associated with an alert event from at least one external device via the network, read tags, and control the light element to modify at least one characteristic of the visible light produced thereby when information read from one of the tags includes the tag identifier.
DOORBELL COMMUNICATION SYSTEMS AND METHODS
The disclosure includes a doorbell having a visitor detection system that can comprise at least one of a camera, a microphone, and a motion detector. The method for using the doorbell can comprise recording, via the camera, video data that represents a video. The method can also comprise recording, via the microphone, audio data that represents audio. The method of using the doorbell can comprise transmitting at least a portion of the video data and at least a portion of the audio data, to a remote computing device that is communicatively coupled to the doorbell. The method can also comprise transmitting the video data and the audio data to a remote server that is communicatively coupled to the doorbell.