Patent classifications
G08B13/2482
Radio frequency identification (RFID) tag location verification using short range communication
An EAS system first transmits, over a time, a radio frequency identification (RFID) interrogation signal into an RFID interrogation zone of an EAS system. The system then first receives at least one RFID response signal from a first RFID tag of the system responding to the interrogation signal. The system second transmits, over a second time overlapping at least in part with the first time, a non-RFID RF signal into a second zone. The second zone and the RFID interrogation zone overlap to form a zone of interest. The system second receives, from the first RFID tag, an indication that the first RFID tag received the second transmission. The system determines, based on receiving both the RFID response signal from a first RFID tag and the indication that the first RFID tag received the second transmission, that the first RFID tag is in the zone of interest.
Methods and apparatuses for determining frequency response of a security tag
Aspects of the present disclosure include methods, systems, and non-transitory computer readable media for transmitting at least one incident radio frequency identification (RFID) signal to a RFID tag attached to a merchandize item, receiving at least one reflected RFID signal from the RFID tag, determining a frequency response of the RFID tag based on the at least one reflected RFID signal, comparing the frequency response to a plurality of baseline frequency responses, and determining a state of the RFID tag based on the comparing.
Security tag for inventory and anti-theft alarm system
The disclosed technology relates to a security tag. The security tag can include a tamper assembly having a clutch assembly capable of affixing the security tag to a merchandise item and a locking device for inserting into the clutch mechanism. An insertion of the locking device into the clutch mechanism causes a transmission of a closed signal indicating a closed status for the security tag, and a displacement of the locking device causes a transmission of an open signal indicating an open status for the security tag.
DUAL-ANTENNA, FOUR-ARMED IDENTIFICATION TAG
Consistent with disclosed embodiments, systems, methods, and computer readable media pertaining to a battery-less identification tag for embedding into products may be provided. Embodiments may include a flexible substrate; a first differential antenna on the flexible substrate, the first differential antenna including a first meandering arm and a second meandering arm, and the first differential antenna being of a first size; a second differential antenna on the flexible substrate, the second differential antenna including a third meandering arm and fourth meandering arm, and the second differential antenna being of a second size smaller than the first size; and at least one communications chip connected to the first differential antenna and the second differential antenna.
Validating radio frequency identification (RFID) alarm event tags
An RFID portal of an EAS system first interrogates a first zone extending into a controlled area beyond a threshold distance from an interrogating antenna of the portal. The portal defines an exit from the controlled area, the threshold distance being less than a width of the exit. The portal first detects, in response to the first interrogating, a first response of a particular RFID tag. The portal second interrogate, subsequent to the first detecting, in a second zone extending into the controlled area at least to the threshold distance. The portal second detects, in response to the second interrogating, at least one second response of the particular RFID tag indicating a received signal strength of the second interrogating at the particular RFID tag corresponding to a distance from an interrogating antenna of the portal less than the threshold distance. The EAS system alarms in response to the second detecting.
Methods, systems and devices for electronic article surveillance deactivation having randomized transmission rates
Methods, systems and devices for providing an interrogation signal from a handheld deactivation device for identifying a security tag. Identifying the security tag includes initiating an interrogation signal, wherein the interrogation signal includes plurality of transmission bursts and a plurality of random time periods to wait between transmission bursts such that a unique time period elapses between each of the plurality of transmission bursts. The interrogation signal is then transmitted by transmitting each of the plurality of transmission bursts for a portion of a duty cycle and interrupting transmission between each of the plurality of transmission bursts for one of the plurality of random time periods such that a unique and random time period elapses between each of the plurality of transmission bursts. The period transmission of the interrogation signal provides for improved battery life of a handheld scanning and deactivation device.
Package protection using existing security system
A computer-implemented method includes receiving, by a base station of a security system, an identification of a shipment package, the identification received from a first security sensor that is part of the security system. The method further includes adding, by the base station, a shipment device of the shipment package as a second security sensor of the security system. The method further includes configuring, by the base station, the shipment device in protect-mode, wherein the shipment device sounds an alarm in response to the shipment being displaced by at least a predetermined distance when in the protect-mode. The method further includes reconfiguring, by the base station, the shipment device in safe-mode in response to receiving, from a customer associated with the shipment package, a confirmation signal that the shipment package has been safely received.
Merchandise sensor and method for protecting an item of merchandise
A merchandise sensor for protecting an item of merchandise displayed on a merchandise display security device from theft includes sensor electronics and a sensor element operably coupled to the sensor electronics. The sensor element provides an output value in an initial stable state before an interaction state and in a subsequent stable state following the interaction state. The sensor electronics compares the output value of the sensor element in the subsequent stable state and the output value of the sensor element in the initial stable state to determine whether a change in the output value indicates an alarm condition. In the event that the output value of the sensor element in the subsequent stable state is not within a predetermined tolerance bandwidth of the output value of the sensor element in the initial stable state, the sensor electronics activates an alarm in response to the alarm condition.
Alarming security device and method comprising an electronic article surveillance tag and tamper detection circuitry
A security device is provided that includes an electronic article surveillance tag that may be configured to resonate to provide a wireless response signal to a deactivator to trigger generation of a deactivation field. Further, the security device may include tamper detection circuitry which may include a tamper sensor configured to generate a tamper signal in response to detecting a tamper event, a deactivation sensor configured to generate a deactivation signal in response to detecting the deactivation field, and a sounder. In this regard, the tamper detection circuitry may be configured to deactivate the tamper detection circuitry in response to receiving the deactivation signal from the deactivation sensor such that receipt of the tamper signal after deactivation of the tamper detection circuitry does not trigger the sounder to emit the alarm.
Anti-theft security device and perimeter detection system
A security system in accordance with an embodiment of the present invention includes a security tag operable for connection to an object, a monitoring device operable to monitor whether a party removes or attempts to remove the security tag from the object; an alarm operable to emit a tamper signal when the monitoring device indicates that a party has removed or attempted to remove the security tag from the object in an unauthorized removal condition, and a remote collector system adapted to communicate with the security tag to set the security tag in the unauthorized removal condition and an authorized removal condition, wherein upon receipt of the tamper signal, the remote collector system generates a security message.