G08B13/2445

SYSTEMS AND METHODS FOR INCREASING ALARM CONFIDENCE IN EAS DETECTION SYSTEMS

Systems and methods for operating an EAS detection system. The methods comprise: detecting an Active Security Tag (AST) in an EAS detection zone; determining whether AST is coupled to an object identified in a list; and performing operations when a determination is made that AST is coupled to a listed object. The operations involve: accessing sensor data generated by at least one sensor device disposed on/near display equipment associated with the listed object; processing the sensor data to determine whether a person was within a defined distance range of AST during a period of time immediately preceding the detecting; concluding that a false alarm scenario exists when the sensor data indicates that a person was not within the defined distance range of AST during the period of time; and suppressing alarm issuance by the EAS detection system in response to the false alarm scenario conclusion.

Merchandise activity sensor system and methods of using same

Apparatus and systems using merchandise activity sensors for increasing the awareness of interactivity with merchandise on retail store displays (shelves, peg hooks, merchandise pushers, and other Point of Purchase displays) in order to facilitate more effective customer service, reduce theft and to provide additional analysis data related to merchandise/shopper interaction. Additionally, apparatus and systems for the conversion of cameras from passive to active deterrence devices aware of events occurring the environment. More particularly, the present invention pertains to awareness of behaviors often related to potential theft activity.

SECURITY TAG FOR TEXTILES USING CONDUCTIVE THREAD
20210082266 · 2021-03-18 ·

Electronic article surveillance (EAS) in which an EAS-enabled item includes a textile element and an EAS element. The EAS element includes an antenna subsystem and EAS electronic. The antenna subsystem is integrated into the textile element, where integrated connotes a manner of incorporation that would require damage to the item to remove by typical methods. The EAS electronics are in conductive communication with the antenna subsystem.

Securing a security tag into an article

A method for securing a security tag into an article of clothing includes positioning an end of the security tag into a first opening to an interface space between two layers of the article of clothing. The two layers are fixedly connected by one or more opposing connectors that are spaced apart in a manner to form the interface space sized to receive the security tag. The security tag is fully moved into the interface space. Also described herein is a security tag specially configured for placement into the interface space between two layers of the article of clothing.

Tamper-evident item and item validation system and method

A tamper sensing element is provided which can be applied to a product having a housing or casing with a critical area where the housing or casing can be opened or separated at or along a critical area. The tamper sensing element is operable to determine if the housing or casing has been opened or separated at or along the critical area. The tamper sensing element comprises a sensor for detecting a change in a monitored parameter indicative of the housing or casing having been opened or separated at or along the critical area, a memory for storing product data and tag data; a circuit for updating the memory upon detection of a change in the parameter monitored by the sensor; and means for transmitting information contained in the memory upon being queried by a scanning device. Also disclosed is a system and method for use at security check points for scanning/screening products provided with the tamper sensing element so that a security official/screener can readily determine if a product has potentially been tampered with.

Systems and methods for increasing alarm confidence in EAS detection systems

Systems and methods for operating an EAS detection system. The methods comprise: detecting an Active Security Tag (AST) in an EAS detection zone; determining whether AST is coupled to an object identified in a list; and performing operations when a determination is made that AST is coupled to a listed object. The operations involve: accessing sensor data generated by at least one sensor device disposed on/near display equipment associated with the listed object; processing the sensor data to determine whether a person was within a defined distance range of AST during a period of time immediately preceding the detecting; concluding that a false alarm scenario exists when the sensor data indicates that a person was not within the defined distance range of AST during the period of time; and suppressing alarm issuance by the EAS detection system in response to the false alarm scenario conclusion.

SYSTEMS AND METHODS FOR INCREASING ALARM CONFIDENCE IN EAS DETECTION SYSTEMS

Systems and methods for operating an EAS detection system. The methods comprise: detecting an Active Security Tag (AST) in an EAS detection zone; determining whether AST is coupled to an object identified in a list; and performing operations when a determination is made that AST is coupled to a listed object. The operations involve: accessing sensor data generated by at least one sensor device disposed on/near display equipment associated with the listed object; processing the sensor data to determine whether a person was within a defined distance range of AST during a period of time immediately preceding the detecting; concluding that a false alarm scenario exists when the sensor data indicates that a person was not within the defined distance range of AST during the period of time; and suppressing alarm issuance by the EAS detection system in response to the false alarm scenario conclusion.

DURABLE RFID PRINTED FABRIC LABELS
20200151527 · 2020-05-14 ·

Durable fabric RFID labels are provided for mounting on garments, fabrics and other fabric-containing items, the mounting and durability being before, during or after manufacturing and processing of the items. These labels are robust enough to withstand processing during manufacturing, while being capable of remaining on the item during inventory handling, merchandising and consumer use, including washing and drying. The durable labels include an RFID inlay, a face sheet overlying a first face of the RFID inlay, and a functional adhesive, such as a hot-melt adhesive, overlying a second face of the RFID inlay. The face sheet can be of printable material or have indicia or be a printed face sheet. The functional adhesive can be of a moisture-resistive type. The RFID inlay can be encased within a pocket of polymeric material. A polymeric sheet reinforcement layer can be adhered to and cover all or a portion of the RFID inlay.

TAMPER-EVIDENT ITEM AND ITEM VALIDATION SYSTEM AND METHOD
20200134410 · 2020-04-30 ·

A tamper sensing element is provided which can be applied to a product having a housing or casing with a critical area where the housing or casing can be opened or separated at or along a critical area. The tamper sensing element is operable to determine if the housing or casing has been opened or separated at or along the critical area. The tamper sensing element comprises a sensor for detecting a change in a monitored parameter indicative of the housing or casing having been opened or separated at or along the critical area, a memory for storing product data and tag data; a circuit for updating the memory upon detection of a change in the parameter monitored by the sensor; and means for transmitting information contained in the memory upon being queried by a scanning device. Also disclosed is a system and method for use at security check points for scanning/screening products provided with the tamper sensing element so that a security official/screener can readily determine if a product has potentially been tampered with.

Wallet alarm

A security device for use with an item of merchandise may include a rigid housing adapted for insertion into a pocket of the item, an alarm disposed within the housing, and a sensor mounted to the housing. The sensor may be configured to indicate whether the security device is outside the pocket of the item, whereby an indication that the security device is outside the pocket of the item causes the alarm to generate a human-perceptible alert.