Patent classifications
G08B13/2482
Wireless device for ambient energy harvesting
Embodiments of the present disclosure generally relate to a wireless identification tag configured to harvest ambient energy and transmit an identification signal intermittently, and system and methods for use thereof. In one implementation, the tag may include a transmitter configured to transmit a first signal to a first receiver in a first frequency, and to transmit a second signal to a second receiver in the first frequency. The tag may also include an energy storage component configured for collecting and storing ambient energy and for powering transmission of the transmitter. The tag may also include a circuit configured to monitor energy stored in the energy storage component, and to prevent the transmitter from transmitting the first signal to the first receiver when the energy stored in the energy storage component is insufficient to transmit the second signal to the second receiver.
Tag configured for interaction with security gate
Embodiments of the present disclosure generally relate to a wireless identification tag triggerable by an EAS gate while remaining invisible to the EAS gate, and system and methods for use thereof. In one implementation, the tag may include an antenna tuned to receive energy transmitted in at least one EAS gate frequency range and configured to be non-detectable by the EAS gate. The tag may also include a transmitter configured to send an identification signal and an energy storage component for powering the transmitter. The tag may also include a circuit connected to the antenna. The circuit may be configured to detect energy transmitted from the EAS gate in at least one of the EAS gate frequency ranges, and to cause the transmitter to transmit, to a receiver other than the EAS gate, the identification signal in a frequency outside the EAS gate frequency ranges.
METHOD AND SYSTEM FOR PROBABILISTIC NETWORK BASED LOSS PREVENTION SENSORS
A system may be configured to implement a probability network for loss prevention sensors. In some aspects, the system may determine a location transition of a tag associated with an article, determine a first predictive value based at least in part on a first predictive structure and the location transition, the first predictive structure corresponding to a valid detection alarm, and determine a second predictive value based at least in part on a second predictive structure and the location transition, the second predictive structure corresponding to an invalid detection alarm. Further, the system may generate a notification based at least in on part on comparing the first predictive value to the second predictive value, the notification indicating unauthorized movement of the tag outside of a geographic area.
Identification tag configured for variable intervals between signal transmissions
Embodiments of the present disclosure generally relate to a wireless identification tag with varying ID transmission timing, and system and methods for use thereof. In one implementation, the tag may include at least one transmitter and an energy storage component electrically connected to the at least one transmitter. The energy storage component may be configured to collect and store ambient energy and to power transmission of the at least one transmitter. The tag may also include at least one circuit. The at least one circuit may be configured to cause the at least one transmitter to transmit a sequence of identification signals in non-uniform intervals such that times between identification signal transmissions of three consecutive transmissions vary.
PROGRAMMABLE SECURITY SYSTEM AND METHOD FOR PROTECTING MERCHANDISE
A programmable security system and method for protecting an item of merchandise includes a programming station, a programmable key and a security system. The programming station generates a security code and communicates the security code to a memory of the programmable key. The programmable key initially communicates the security code to a memory of the security device and subsequently operates the security device upon a matching of the security code in the memory of the security device with the security code in the memory of the programmable key. The programmable key may also transfer power via electrical contacts or inductive transfer from an internal battery to the security device to operate a lock mechanism. The security code may be communicated by wireless infrared (IR) systems, electrical contacts or inductive transfer. A timer inactivates the programmable key and/or the security device after a predetermine period of time. A counter inactivates the programmable key after a predetermined maximum number of activations.
Privacy system for electronically tagged goods
Embodiments of the present disclosure generally relate to systems and methods for providing privacy to downstream owners of electronically tagged goods. In one implementation, the system may include at least one processor that may be configured to store IDs for a plurality of tags including at least a first owner ID and a second owner ID for a particular tag; associate first information of the particular tag with the first owner ID at a time when the first owner of the particular tag is recorded as owning the tag; record a transaction transferring ownership of the particular tag from the first owner to a second owner; and after the transfer of ownership, associate second information of the particular tag with the second owner ID, and prevent the second owner from accessing the first information.
Capacitor architecture for wireless communication tag
Embodiments of the present disclosure generally relate to a wireless identification tag configured to collect and store ambient energy for use in delayed transmission, and system and methods for use thereof. In one implementation, the tag may include a receiver for receiving ambient energy; a first capacitor for storing the ambient energy; and a second capacitor for collecting and storing the ambient energy. The second capacitor may have lower capacitance than the first capacitor. The tag may also include an inductor interconnecting the first capacitor and the second capacitor. The tag may also include circuitry configured such that ambient energy received by the receiver is initially stored in the second capacitor and subsequently transferred to and stored in the first capacitor. The tag may also include a transmitter electrically connected to first capacitor, to enable the energy stored in the first capacitor to power the transmitter.
PRODUCT TAGS, SYSTEMS, AND METHODS FOR CROWDSOURCING AND ELECTRONIC ARTICLE SURVEILLANCE IN RETAIL INVENTORY MANAGEMENT
Methods and systems for inventory management are disclosed. In one aspect, a method includes receiving, from a first device, product information associated with an article, receiving, from the first device, location information of the first device; identifying a merchant based on the location information, generating an online listing for the article in an online marketplace of the identified merchant, the online listing including the product information; and making the online listing accessible to a plurality of consumers.
SYSTEM FOR MONITORING AND CONTROLLING SHOPPING CART USAGE
A system for monitoring and controlling shopping cart usage comprises a wheel assembly that attaches to a shopping cart. The wheel assembly includes a wheel, a brake that can be activated to inhibit rotation of the wheel, a controller that controls the brake, a VLF receiver, and an RF transceiver. The RF transceiver may, for example, operate in a 2.4 GHz frequency band. In some implementations, the RF transceiver may be used to detect entry of the shopping cart into a checkout area of the store, and the VLF receiver may be used to detect that the shopping cart is exiting the store. The controller may activate the brake if the shopping cart attempts to exit the store without first passing through a checkout area.
PROGRAMMABLE SECURITY SYSTEM AND METHOD FOR PROTECTING MERCHANDISE
A programmable security system and method for protecting an item of merchandise includes a programming station, a programmable key and a security system. The programming station generates a security code and communicates the security code to a memory of the programmable key. The programmable key initially communicates the security code to a memory of the security device and subsequently operates the security device upon a matching of the security code in the memory of the security device with the security code in the memory of the programmable key. The programmable key may also transfer power via electrical contacts or inductive transfer from an internal battery to the security device to operate a lock mechanism. The security code may be communicated by wireless infrared (IR) systems, electrical contacts or inductive transfer. A timer inactivates the programmable key and/or the security device after a predetermine period of time. A counter inactivates the programmable key after a predetermined maximum number of activations.