Patent classifications
G08B13/2482
System and method for detecting scan irregularities at self-checkout terminals
A system for detecting a scan irregularity in scanning process during check-out at a retail store, includes an image receiving module for receiving a video stream of a scanning zone, an image processing module for detecting visual scan intervals in image frames of the video stream, and a decision module. The decision module is configured to process each detected visual scan interval, wherein a processed visual scan interval includes a valid scan action, wherein the valid scan action is a user action performed for scanning an item. The decision module is further configured to detect a scan irregularity in the check-out process, wherein the scan irregularity occurs when an item identified for scanning in a processed visual scan interval is absent in a list of scanned items generated by the scanner during corresponding interval, and provide an alert regarding the scan irregularity at a user computing device.
MOTORIZED CART RETRIEVER FOR MONITORING CART STATUS
A motorized cart retriever, which may be a cart pusher or a cart puller, can apply a force to a nest of human-propelled, wheeled carts to facilitate retrieval of the carts. The cart retriever can include a transceiver configured to wirelessly receive cart status information from cart transmitters of the wheeled carts and wirelessly report event data to a control unit. The cart status information may include an identification of the cart transmitter, a location of the cart, a lock or unlock status of a cart wheel, a misuse condition, etc. The event data can include the cart status information, a number of wheeled carts being retrieved, etc. The cart wheel may include a brake. The transceiver may communicate a message to the cart wheel to keep the brake unactuated during retrieval. The control unit may analyze the event data to detect traffic patterns of the carts.
Wireless device configured for powering transmissions with harvested energy
Embodiments of the present disclosure generally relate to a wireless identification tag configured to harvest ambient energy and transmit an identification signal intermittently, and system and methods for use thereof. In one implementation, the tag may include an antenna configured to receive ambient energy. The tag may also include an energy storage component configured to aggregate and store the received ambient energy. The tag may also include a transmitter electrically connected to the energy storage component and configured to transmit the identification signal. The tag may also include a circuit connected to the transmitter and configured to implement an identification transmission rule, to cause the transmitter to delay sending the identification signal even when sufficient energy for transmission of the identification signal is aggregated and stored in the energy storage component.
PRIVACY SYSTEM FOR ELECTRONICALLY TAGGED GOODS
Embodiments of the present disclosure generally relate to systems and methods for providing privacy to downstream owners of electronically tagged goods. In one implementation, the system may include at least one processor that may be configured to store IDs for a plurality of tags including at least a first owner ID and a second owner ID for a particular tag; associate first information of the particular tag with the first owner ID at a time when the first owner of the particular tag is recorded as owning the tag; record a transaction transferring ownership of the particular tag from the first owner to a second owner; and after the transfer of ownership, associate second information of the particular tag with the second owner ID, and prevent the second owner from accessing the first information.
Article-identification and location device systems and methods of using same
An apparatus for helping locate an item of interest in or near a building comprises an indicator and a body with a pair of pincers adapted to operate in opposition to grasp or be placed on or near the item of interest. The body houses a radiofrequency (RF) receiver configured to receive RF signals transmitted by an RF transmitter, and a processor in communication with the RF receiver and the indicator. The processor is configured to acquire information from the RF signals that are received by the RF receiver and to turn on the indicator in response to the information acquired from the RF signals.
Programmable security system and method for protecting merchandise
A programmable security system and method for protecting an item of merchandise includes a programming station, a programmable key and a security system. The programming station generates a security code and communicates the security code to a memory of the programmable key. The programmable key initially communicates the security code to a memory of the security device and subsequently operates the security device upon a matching of the security code in the memory of the security device with the security code in the memory of the programmable key. The programmable key may also transfer power via electrical contacts or inductive transfer from an internal battery to the security device to operate a lock mechanism. The security code may be communicated by wireless infrared (IR) systems, electrical contacts or inductive transfer. A timer inactivates the programmable key and/or the security device after a predetermine period of time. A counter inactivates the programmable key after a predetermined maximum number of activations.
Product tags, systems, and methods for crowdsourcing and electronic article surveillance in retail inventory management
Methods and systems for inventory management are disclosed. In one aspect, a method includes receiving, from a first device, product information associated with an article, receiving, from the first device, location information of the first device; identifying a merchant based on the location information, generating an online listing for the article in an online marketplace of the identified merchant, the online listing including the product information; and making the online listing accessible to a plurality of consumers.
Systems and methods for using radio frequency identification as an adaptive alarm threshold
Systems and methods for operating an Electronic Article Surveillance (“EAS”) system. The methods comprise: detecting movement of a plurality of security tags in a facility using Radio Frequency Identification (“RFID”); identifying which security tags of the plurality of security tags are moving towards an exit of the facility or are in a surveillance zone; determining a number of the identified security tags that are coupled to unsold objects; comparing the number to a threshold value; and causing the EAS system to issue an alarm when the number is greater than or equal to the threshold value.
System for simultaneous tag triggering and sequential tag reading
Embodiments of the present disclosure generally relate to systems, methods, and computer readable media containing instructions for causing simultaneous triggering and sequential reading of a plurality of tags. In one implementation, the instructions may include displaying an activatable element on a graphical user interface for activating a 2.4 GHz transmitter. The instructions may also include activating the transmitter to cause each of a plurality of tags to send a unique tag ID to a receiver. The instructions may also include reading a first group of tag IDs during a first time interval; recording first information associated with the first group; maintaining activation of the transmitter to cause transmission of at least some of the tag IDs of the first group along with the unique tag IDs of a second group of tag IDs to the receiver; and recording second information associated with the second group.
VALIDATING RADIO FREQUENCY IDENTIFICATION (RFID) TAG ALARM EVENTS
In an Electronic Article Surveillance (EAS), a radio frequency identification (RFID) subsystem of an EAS system, can detect a presence of an RFID tag in an RFID interrogation zone associated with a boundary of a controlled area. The EAS system can first determine that the RFID tag is not authorized to leave the controlled area across the boundary. A radar subsystem of the EAS system can second determine, within a first window of time around the first detecting, whether an object in motion is associated with the boundary. The EAS system can alarm based upon both determining that the RFID tag is not authorized to leave the controlled area and determining that the object in motion is associated with the boundary.