G08B13/2482

METHODS AND APPARATUSES FOR DETERMINING FREQUENCY RESPONSE OF A SECURITY TAG
20220171950 · 2022-06-02 ·

Aspects of the present disclosure include methods, systems, and non-transitory computer readable media for transmitting at least one incident radio frequency identification (RFID) signal to a RFID tag attached to a merchandize item, receiving at least one reflected RFID signal from the RFID tag, determining a frequency response of the RFID tag based on the at least one reflected RFID signal, comparing the frequency response to a plurality of baseline frequency responses, and determining a state of the RFID tag based on the comparing.

VALIDATING RADIO FREQUENCY IDENTIFICATION (RFID) ALARM EVENT TAGS

An RFID portal of an EAS system first interrogates a first zone extending into a controlled area beyond a threshold distance from an interrogating antenna of the portal. The portal defines an exit from the controlled area, the threshold distance being less than a width of the exit. The portal first detects, in response to the first interrogating, a first response of a particular RFID tag. The portal second interrogate, subsequent to the first detecting, in a second zone extending into the controlled area at least to the threshold distance. The portal second detects, in response to the second interrogating, at least one second response of the particular RFID tag indicating a received signal strength of the second interrogating at the particular RFID tag corresponding to a distance from an interrogating antenna of the portal less than the threshold distance. The EAS system alarms in response to the second detecting.

PACKAGE PROTECTION USING EXISTING SECURITY SYSTEM

A computer-implemented method includes receiving, by a base station of a security system, an identification of a shipment package, the identification received from a first security sensor that is part of the security system. The method further includes adding, by the base station, a shipment device of the shipment package as a second security sensor of the security system. The method further includes configuring, by the base station, the shipment device in protect-mode, wherein the shipment device sounds an alarm in response to the shipment being displaced by at least a predetermined distance when in the protect-mode. The method further includes reconfiguring, by the base station, the shipment device in safe-mode in response to receiving, from a customer associated with the shipment package, a confirmation signal that the shipment package has been safely received.

Alarming Product Security Device
20220139178 · 2022-05-05 ·

A security device is provided that includes an electronic article surveillance tag that may be configured to resonate to provide a wireless response signal to a deactivator to trigger generation of a deactivation field. Further, the security device may include tamper detection circuitry which may include a tamper sensor configured to generate a tamper signal in response to detecting a tamper event, a deactivation sensor configured to generate a deactivation signal in response to detecting the deactivation field, and a sounder. In this regard, the tamper detection circuitry may be configured to deactivate the tamper detection circuitry in response to receiving the deactivation signal from the deactivation sensor such that receipt of the tamper signal after deactivation of the tamper detection circuitry does not trigger the sounder to emit the alarm.

Navigation systems and methods for wheeled objects

A navigation system uses a dead reckoning method to estimate an object's present position relative to one or more prior positions. In some embodiments, the dead reckoning method determines a change in position from the object's heading and speed during an elapsed time interval. In embodiments suitable for use with wheeled objects, the dead reckoning method determines the change in position by measuring the heading and the amount of wheel rotation. Some or all of the components of the navigation system may be disposed within a wheel, such as a wheel of a shopping cart.

Programmable security system and method for protecting merchandise

A programmable security system and method for protecting an item of merchandise includes a programming station, a programmable key and a security system. The programming station generates a security code and communicates the security code to a memory of the programmable key. The programmable key initially communicates the security code to a memory of the security device and subsequently operates the security device upon a matching of the security code in the memory of the security device with the security code in the memory of the programmable key. The programmable key may also transfer power via electrical contacts or inductive transfer from an internal battery to the security device to operate a lock mechanism. The security code may be communicated by wireless infrared (IR) systems, electrical contacts or inductive transfer. A timer inactivates the programmable key and/or the security device after a predetermined period of time. A counter inactivates the programmable key after a predetermined maximum number of activations.

Decreasing false alarms in RFID exit portals

Transmitting a radio frequency identification (RFID) interrogation signal into an RFID interrogation zone of an Electronic Article Surveillance (EAS) system. Detecting at least one response signal from a first RFID tag of the EAS system responding to the interrogation signal. Capturing, at one or more times in a window of time around the detection, sensor data within a sensor field, the sensor field and the RFID interrogation zone overlapping to form a zone of interest. Characterizing movement of a non-tag object during the window of time based on the captured sensor data. Determining whether the first RFID tag is associated with the characterized non-tag object based on a comparison of the at least one response signal and the characterized movement of the non-tag object.

Decreasing false alarms in RFID exit portals

Transmitting a radio frequency identification (RFID) interrogation signal into an RFID interrogation zone of an Electronic Article Surveillance (EAS) system. Detecting at least one response signal from a first RFID tag of the EAS system responding to the interrogation signal. Capturing, at one or more times in a window of time around the detection, sensor data within a sensor field, the sensor field and the RFID interrogation zone overlapping to form a zone of interest. Characterizing movement of a non-tag object during the window of time based on the captured sensor data. Determining whether the first RFID tag is associated with the characterized non-tag object based on a comparison of the at least one response signal and the characterized movement of the non-tag object.

Programmable security system and method for protecting merchandise

A programmable security system and method for protecting an item of merchandise includes a programming station, a programmable key and a security system. The programming station generates a security code and communicates the security code to a memory of the programmable key. The programmable key initially communicates the security code to a memory of the security device and subsequently operates the security device upon a matching of the security code in the memory of the security device with the security code in the memory of the programmable key. The programmable key may also transfer power via electrical contacts or inductive transfer from an internal battery to the security device to operate a lock mechanism. The security code may be communicated by wireless infrared (IR) systems, electrical contacts or inductive transfer. A timer inactivates the programmable key and/or the security device after a predetermine period of time. A counter inactivates the programmable key after a predetermined maximum number of activations.

Foreign RFID tag discrimination and management

Managing foreign RFID tags within a secured area involves use of a first RFID portal system to read tag data from an RFID tag present within a first portal zone. A processing device associated with the first RFID portal system is used to determine whether the RFID tag is entering the secured area. The determination is based on an evaluation of a direction of travel of the RFID tag through the first portal zone. Responsive to determining that the RFID tag is in fact entering the secured area, one or more operations are performed to cause a first tag value corresponding to the tag data to be added into a safe to exit (STE) list.