Patent classifications
G08B13/2482
METHODS AND SYSTEMS FOR PEDESTAL PROJECTING IN A RETAIL ENVIRONMENT
Examples described herein generally relate to a system and method for projecting content in a retail environment. The system and method may include an image projector for projecting content on a surface of the retail environment. The system and method may also include a security pedestal comprising the image projector. The system and method may also include receiving at the image projector a first signal indicating a first content to be projected. The system and method may also include receiving at the image projector a second signal indicating a second content to be projected after the first content.
VALIDATING RADIO FREQUENCY IDENTIFICATION (RFID) ALARM EVENT TAGS
An RFID portal of an EAS system first interrogates a first zone extending into a controlled area beyond a threshold distance from an interrogating antenna of the portal. The portal defines an exit from the controlled area, the threshold distance being less than a width of the exit. The portal first detects, in response to the first interrogating, a first response of a particular RFID tag. The portal second interrogate, subsequent to the first detecting, in a second zone extending into the controlled area at least to the threshold distance. The portal second detects, in response to the second interrogating, at least one second response of the particular RFID tag indicating a received signal strength of the second interrogating at the particular RFID tag corresponding to a distance from an interrogating antenna of the portal less than the threshold distance. The EAS system alarms in response to the second detecting.
Wireless dual-mode identification tag
Embodiments of the present disclosure generally relate to systems and methods for providing privacy to downstream owners of electronically tagged goods. In one implementation, the system may include at least one processor that may be configured to store IDs for a plurality of tags including at least a first owner ID and a second owner ID for a particular tag; associate first information of the particular tag with the first owner ID at a time when the first owner of the particular tag is recorded as owning the tag; record a transaction transferring ownership of the particular tag from the first owner to a second owner; and after the transfer of ownership, associate second information of the particular tag with the second owner ID, and prevent the first owner from accessing the second information.
ANTI-THEFT TRANSPONDER
A transponder for securing a product displayed in a shop. The transponder includes two blocks each including a contact surface, the contact surfaces being positioned face to face, the blocks being connected to each other by an adjustable connection, that allows to manually adjust the moving closer together or farther apart of the blocks with respect to one another, thus allowing the transponder to be attached to a suitable element of the product, by gripping the element between the contact surfaces of the blocks, one of the blocks including wireless detection and transmission equipment, which allows the remote management of the presence of the transponder on the suitable element.
Outdoor furniture monitoring
A method includes, receiving, by a monitoring server, weather data that corresponds to at least one weather condition at a location where a monitoring system monitors an item that is located at an outdoor location of a property and that includes a motion beacon, based on the received weather data, determining a motion tolerance for determining whether a force other than weather likely caused movement of the item, receiving, from the motion beacon, motion data that indicates motion of the item, comparing the motion data to the motion tolerance, based on comparing the motion data to the motion tolerance, determining whether to generate a monitoring system event indicating that a force other than weather likely caused the movement of the item, and performing the monitoring system event indicating that a force other than weather likely caused the movement of the item.
SYSTEMS AND METHODS FOR INCREASING ALARM CONFIDENCE IN EAS DETECTION SYSTEMS
Systems and methods for operating an EAS detection system. The methods comprise: detecting an Active Security Tag (AST) in an EAS detection zone; determining whether AST is coupled to an object identified in a list; and performing operations when a determination is made that AST is coupled to a listed object. The operations involve: accessing sensor data generated by at least one sensor device disposed on/near display equipment associated with the listed object; processing the sensor data to determine whether a person was within a defined distance range of AST during a period of time immediately preceding the detecting; concluding that a false alarm scenario exists when the sensor data indicates that a person was not within the defined distance range of AST during the period of time; and suppressing alarm issuance by the EAS detection system in response to the false alarm scenario conclusion.
Information management system for tagged goods
Embodiments of the present disclosure generally relate to systems and methods for providing access to information associated with electronically tagged goods. In one implementation, the system may include at least one processor configured to store tag IDs of a plurality of tags; and receive a pairing between a particular tag ID and a product ID. The at least one processor may also be configured to receive a pairing between the particular tag ID and an authorized entity associated with the particular tag ID; and receive, from a requester, a query including an encrypted tag ID of the particular tag. The at least one processor may also be configured to decrypt the encrypted tag ID; determine if the requester is the authorized entity; fulfill the query, if the requester is the at least one authorized entity; and deny the query if the requester is not the at least one authorized entity.
METHODS AND SYSTEMS FOR CLASSIFYING TAG STATUS IN A RETAIL ENVIRONMENT
Examples described herein generally relate to a system for monitoring tags in a retail environment. The system includes an exit system including one or more sensors that read a tag to obtain exit system measurements associated with a tag detection event. The system includes a memory and a processor configured to execute instructions to receive a selection of a base configuration, the base configuration including weighting values for a plurality of exit system measurements. The processor may classify a tag detection event into a first tag status for the tag detection event based on application of the weighting values to exit system measurements associated with the tag detection event. The processor may determine a second tag status of the tag after the tag detection event. The processor may update the weighting values using a machine-learning algorithm based on at least the first tag status and the second tag status.
System configured for spoofing avoidance
Embodiments of the present disclosure generally relate to a wireless identification fraud avoidance system and methods for use thereof. In one implementation, the system may include at least one transmitter configured to transmit a first signal to a plurality of identification tags and to cause the identification tags to transmit a second signal. The system may also include a first, proximate receiver configured to receive the second signal from the identification tags. The system may also include a second, more distant receiver configured to receive a third signal from a tag outside a transmission range of the at least one transmitter. The system may also include at least one processor configured to generate a potential fraud alert when the second receiver receives the third signal.
SECURITY TAG WITH TACK POSITION FEEDBACK
Systems and methods for verifying a detachment of a security tag from an article. The methods comprise: using a voltage induced in an internal circuit of the security tag by a magnetic field generated by a detaching unit to power a controller of the security tag; receiving, by the security tag, a first signal sent from the detaching unit; selectively supplying power to an electro-mechanical lock mechanism of the security tag for a certain amount of time to cause a pin to be released from a lock, in response to the first signal; and communicating, from the security tag, a second signal indicating whether or not the pin was released. The voltage is no longer induced in the internal circuit by the detaching unit when the second signal indicates that the pin was released.