Patent classifications
G08B13/2417
SECURING A SECURITY TAG INTO AN ARTICLE
A method for securing a security tag into an article of clothing includes positioning an end of the security tag into a first opening to an interface space between two layers of the article of clothing. The two layers are fixedly connected by one or more opposing connectors that are spaced apart in a manner to form the interface space sized to receive the security tag. The security tag is fully moved into the interface space. Also described herein is a security tag specially configured for placement into the interface space between two layers of the article of clothing.
Radio frequency identification (RFID) tag location verification using short range communication
An EAS system first transmits, over a time, a radio frequency identification (RFID) interrogation signal into an RFID interrogation zone of an EAS system. The system then first receives at least one RFID response signal from a first RFID tag of the system responding to the interrogation signal. The system second transmits, over a second time overlapping at least in part with the first time, a non-RFID RF signal into a second zone. The second zone and the RFID interrogation zone overlap to form a zone of interest. The system second receives, from the first RFID tag, an indication that the first RFID tag received the second transmission. The system determines, based on receiving both the RFID response signal from a first RFID tag and the indication that the first RFID tag received the second transmission, that the first RFID tag is in the zone of interest.
Methods and apparatuses for determining frequency response of a security tag
Aspects of the present disclosure include methods, systems, and non-transitory computer readable media for transmitting at least one incident radio frequency identification (RFID) signal to a RFID tag attached to a merchandize item, receiving at least one reflected RFID signal from the RFID tag, determining a frequency response of the RFID tag based on the at least one reflected RFID signal, comparing the frequency response to a plurality of baseline frequency responses, and determining a state of the RFID tag based on the comparing.
System and method for detecting movement of a mobile asset and controlling operations of the asset based on its movement
A system and method are provided for detecting direction of movement. The system includes at least two radio frequency identification (RFID) readers arranged in different locations. The RFID readers transmit respective location signals from their locations and receive corresponding response signals from a portable electronic device (PED) when the PED is within range to receive the corresponding location signals, respectively. The system includes a controller configured to determine whether the individual response signals received by the RFID readers respectively satisfy a predetermined condition at a first time and a second time subsequent to the first time. The controller is also configured to determine a direction of movement of the portable electronic device relative to the locations of the RFID readers during the first and second times based on whether the response signals respectively satisfy the predetermined condition at the first and second times.
INDUCTION-BASED DATA IDENTIFICATION SYSTEM CHARACTERIZED BY REAL-TIME RESPONSE
The present invention provides an induction-based data identification system characterized by real-time response, including: a plurality of mobile identity terminals that can be carried, a gateway system and a background computer. The system configuration and method process of the invention are reasonable; it has both the features of recording any update status data of the objects and real-time response without affected by large amount of information; in addition, the mobile identity terminal has a low power consumption, suitable for the occasions of long-time use, such as anti-theft systems of shopping malls, places of detention, warehouse management, etc.
Security tag for inventory and anti-theft alarm system
The disclosed technology relates to a security tag. The security tag can include a tamper assembly having a clutch assembly capable of affixing the security tag to a merchandise item and a locking device for inserting into the clutch mechanism. An insertion of the locking device into the clutch mechanism causes a transmission of a closed signal indicating a closed status for the security tag, and a displacement of the locking device causes a transmission of an open signal indicating an open status for the security tag.
INCREASED POWER TAG READ CYCLE
A radio frequency identification (RFID) system first interrogates, in a first mode, one or more particular target zones of the plurality of target zones including a given target zone. Each particular target zone is interrogated with one of the antennas at a time at a first power for the particular target zone. The RFID system monitors, upon first interrogating, for a trigger condition to occur. In response to the trigger condition not occurring, the RFID system continues the first interrogation in the first mode. In response to the trigger condition occurring, the RFID system second interrogates the given target zone in a second mode at a second power with a plurality of the antennas. The second power for the given target zone is greater in an aggregate across the second interrogating antennas than the first power for the given target zone
DEVICE FOR SEALING A CONTAINER COMPRISING A NECK
The invention relates to a device (100) for sealing a container having a neck, said device comprising: a deformable portion (1) intended to be at least partially arranged inside the neck of the container so as to seal it in a leak tight manner, said portion being capable of deforming elastically when inserted into the neck, said portion comprising a first end intended to be oriented towards the inside of the container, and a radiofrequency identification tag (11), said device being characterised in that it comprises at least one piezoelectric component (10) electrically connected to the tag (11) and arranged inside said deformable portion (1), within a blind recess on the first end side, generating an electric voltage caused by expansion of the deformable portion containing the piezoelectric component when said deformable portion is removed from the neck, said electric voltage being capable of causing a change of state of the radiofrequency identification tag.
Validating radio frequency identification (RFID) alarm event tags
An RFID portal of an EAS system first interrogates a first zone extending into a controlled area beyond a threshold distance from an interrogating antenna of the portal. The portal defines an exit from the controlled area, the threshold distance being less than a width of the exit. The portal first detects, in response to the first interrogating, a first response of a particular RFID tag. The portal second interrogate, subsequent to the first detecting, in a second zone extending into the controlled area at least to the threshold distance. The portal second detects, in response to the second interrogating, at least one second response of the particular RFID tag indicating a received signal strength of the second interrogating at the particular RFID tag corresponding to a distance from an interrogating antenna of the portal less than the threshold distance. The EAS system alarms in response to the second detecting.
Theft prevention for returned merchandise
Consistent with disclosed embodiments, systems, methods, and computer readable media for electronic security systems for preventing theft of returned goods may be provided. Embodiments may include an electronic article surveillance (EAS) gate in an establishment and at least one receiver configured to receive transmissions from wirelessly transmitting tags. Embodiments may also include at least one processor configured to receive, from a mobile communications device associated with a previous purchaser, a notification of intent to return a previously purchased product to the establishment; identify a unique tag ID of a specific wirelessly transmitting tag associated with the previously purchased product; update a data structure to indicate that the previously purchased product was returned to the establishment; and enable an ability to initiate an alarm when the at least one receiver receives a transmission from the specific tag associated with the previously purchased product in proximity to the EAS gate.