G08B13/2482

DECREASING FALSE ALARMS IN RFID EXIT PORTALS
20220230531 · 2022-07-21 ·

Transmitting a radio frequency identification (RFID) interrogation signal into an RFID interrogation zone of an Electronic Article Surveillance (EAS) system. Detecting at least one response signal from a first RFID tag of the EAS system responding to the interrogation signal. Capturing, at one or more times in a window of time around the detection, sensor data within a sensor field, the sensor field and the RFID interrogation zone overlapping to form a zone of interest. Characterizing movement of a non-tag object during the window of time based on the captured sensor data. Determining whether the first RFID tag is associated with the characterized non-tag object based on a comparison of the at least one response signal and the characterized movement of the non-tag object.

METHODS AND APPARATUSES FOR REDUCING FALSE POSITIVE ALARMS

Aspects of the present disclosure include methods, systems, and non-transitory computer readable media for identifying a first sector proximal to a reader and a second sector proximal to the reader, receiving one or more parameters associated with at least one of a minimum sector count setting, an opposite sector threshold setting, or a suppression threshold setting, applying, to the reader, the one or more parameters associated with the at least one of the minimum sector count setting, the opposite sector threshold setting, or the suppression threshold setting, and detecting a tag based on the one or more parameters.

Validating radio frequency identification (RFID) tag alarm events
11423751 · 2022-08-23 · ·

In an Electronic Article Surveillance (EAS), a radio frequency identification (RFID) subsystem of an EAS system, can detect a presence of an RFID tag in an RFID interrogation zone associated with a boundary of a controlled area. The EAS system can first determine that the RFID tag is not authorized to leave the controlled area across the boundary. A radar subsystem of the EAS system can second determine, within a first window of time around the first detecting, whether an object in motion is associated with the boundary. The EAS system can alarm based upon both determining that the RFID tag is not authorized to leave the controlled area and determining that the object in motion is associated with the boundary.

System for monitoring and controlling shopping cart usage

A system for monitoring and controlling shopping cart usage comprises a wheel assembly that attaches to a shopping cart. In some embodiments the wheel assembly includes a wheel, a brake that can be activated to inhibit rotation of the wheel, a controller that controls the brake, a VLF receiver, and an RF transceiver. The RF transceiver may, for example, operate in a 2.4 GHz frequency band. In some implementations, the RF transceiver may be used to detect entry of the shopping cart into a checkout area of the store, and the VLF receiver may be used to detect that the shopping cart is exiting the store. The controller may activate the brake if the shopping cart attempts to exit the store without first passing through a checkout area.

Wireless identification tag with varying identity
11341828 · 2022-05-24 · ·

Embodiments of the present disclosure generally relate to a wireless identification tag with varying identity, and system and methods for use thereof. In one implementation, the tag may include at least one transmitter configured to transmit a tag ID. The tag may also include at least one circuit. The at least one circuit may be configured to receive a first trigger at a first time and generate in a quasi-random manner a first decipherable ID uniquely identifying the tag, and cause the at least one transmitter to transmit the first decipherable ID. The at least one circuit may also be configured to receive a second trigger at a second time and generate in a quasi-random manner a second decipherable ID different from the first decipherable ID and uniquely identifying the tag, and cause the at least one transmitter to transmit the second decipherable ID.

SYSTEM FOR MONITORING AND CONTROLLING SHOPPING CART USAGE
20220119027 · 2022-04-21 ·

A system for monitoring and controlling shopping cart usage comprises a wheel assembly that attaches to a shopping cart. In some embodiments the wheel assembly includes a wheel, a brake that can be activated to inhibit rotation of the wheel, a controller that controls the brake, a VLF receiver, and an RF transceiver. The RF transceiver may, for example, operate in a 2.4 GHz frequency band. In some implementations, the RF transceiver may be used to detect entry of the shopping cart into a checkout area of the store, and the VLF receiver may be used to detect that the shopping cart is exiting the store. The controller may activate the brake if the shopping cart attempts to exit the store without first passing through a checkout area.

Motorized cart retriever for monitoring cart status

A motorized cart retriever, which may be a cart pusher or a cart puller, can apply a force to a nest of human-propelled, wheeled carts to facilitate retrieval of the carts. The cart retriever can include a transceiver configured to wirelessly receive cart status information from cart transmitters of the wheeled carts and wirelessly report event data to a control unit. The cart status information may include an identification of the cart transmitter, a location of the cart, a lock or unlock status of a cart wheel, a misuse condition, etc. The event data can include the cart status information, a number of wheeled carts being retrieved, etc. The cart wheel may include a brake. The transceiver may communicate a message to the cart wheel to keep the brake unactuated during retrieval. The control unit may analyze the event data to detect traffic patterns of the carts.

SMART ALARM MANAGEMENT
20220114871 · 2022-04-14 ·

A security alarm management system and method includes a reader device, a person counter, and an alarm. The reader device reads security tags within a range of the reader. The person counter detects people passing through a point of entry. The person counter can determine a direction of travel of people passing through the point of entry. A white-list includes entries or product identifiers that will not trigger an alarm. The alarm is triggered if conditions associated with the reader device, person counter, and white-list are met.

Unified security device

Systems and methods for operating a Unified Security Device (“USD”). The methods comprise: receiving an Electronic Article Surveillance (“EAS”) interrogation signal with an antenna of the USD; processing the EAS interrogation signal using a processor unit of the USD; using the processor unit to generate an EAS response signal that emulates a response signal produced by an Acousto-Magnetic (AM) type of EAS security tag, in response to the EAS interrogation signal; and communicating the EAS response signal from the USD.

Systems and methods for determining an inventory using a hybrid lighting and inventory system

Systems and methods for determining an inventory. The methods comprise: performing operations by an internal circuit of a light provider to control operations of a light element to produce visible light, where the light provider is coupled to a light fixture installed on a physical structure of a facility; and performing operations by the internal circuit to connect with a network, receive a tag identifier associated with an alert event from at least one external device via the network, read tags, and control the light element to modify at least one characteristic of the visible light produced thereby when information read from one of the tags includes the tag identifier.