G08B13/2471

BAIT PACK WITH GPS AND PROXIMITY ACTIVATION
20210312775 · 2021-10-07 ·

A currency bait pack for tracking stolen currency bundles is activated by movement of the bait pack from a magnetic mounting in a teller drawer to transmit location information using GPS. The bait pack can include a power switch to isolate the battery power source from the GPS tracking device, or can include rechargeable batteries, or both.

Capacitor architecture for wireless communication tag
11138851 · 2021-10-05 · ·

Embodiments of the present disclosure generally relate to a wireless identification tag configured to collect and store ambient energy for use in delayed transmission, and system and methods for use thereof. In one implementation, the tag may include a receiver for receiving ambient energy; a first capacitor for storing the ambient energy; and a second capacitor for collecting and storing the ambient energy. The second capacitor may have lower capacitance than the first capacitor. The tag may also include an inductor interconnecting the first capacitor and the second capacitor. The tag may also include circuitry configured such that ambient energy received by the receiver is initially stored in the second capacitor and subsequently transferred to and stored in the first capacitor. The tag may also include a transmitter electrically connected to first capacitor, to enable the energy stored in the first capacitor to power the transmitter.

Wireless device configured for powering transmissions with harvested energy
11107336 · 2021-08-31 · ·

Embodiments of the present disclosure generally relate to a wireless identification tag configured to harvest ambient energy and transmit an identification signal intermittently, and system and methods for use thereof. In one implementation, the tag may include an antenna configured to receive ambient energy. The tag may also include an energy storage component configured to aggregate and store the received ambient energy. The tag may also include a transmitter electrically connected to the energy storage component and configured to transmit the identification signal. The tag may also include a circuit connected to the transmitter and configured to implement an identification transmission rule, to cause the transmitter to delay sending the identification signal even when sufficient energy for transmission of the identification signal is aggregated and stored in the energy storage component.

PRIVACY SYSTEM FOR ELECTRONICALLY TAGGED GOODS
20210192910 · 2021-06-24 · ·

Embodiments of the present disclosure generally relate to systems and methods for providing privacy to downstream owners of electronically tagged goods. In one implementation, the system may include at least one processor that may be configured to store IDs for a plurality of tags including at least a first owner ID and a second owner ID for a particular tag; associate first information of the particular tag with the first owner ID at a time when the first owner of the particular tag is recorded as owning the tag; record a transaction transferring ownership of the particular tag from the first owner to a second owner; and after the transfer of ownership, associate second information of the particular tag with the second owner ID, and prevent the second owner from accessing the first information.

Tag system and method for long-distance detection of objects

The present invention describes a tag comprising a magnetic element in the form of a microwire of 80-250 microns with giant magnetoimpedance which, when joined to an object, allows for the wireless detection of same by modulating the reflectivity of the microwire. Detection is performed by using a system that emits an electromagnetic wave that has a frequency between 1 and 20 GHz and a low frequency magnetic field (0.01-50 Hz), and detects the modulation of the reflectivity of the microwire. Thus, objects at distances greater than 1 m can be detected.

Pedestal with embedded camera(s) for beam steering

Systems and methods for operating a pedestal of an Electronic Article Surveillance (“EAS”) system. The methods comprise: capturing at least one first image or video by a camera coupled to the pedestal; analyzing the at least one first image or video to detect a person's presence and determine the person's location relative to the camera; determining a first beam pointing direction for the pedestal based on results of the analysis of the at least one first image or video; and steering a read beam of the pedestal in accordance with the first beam pointing direction so that a main lobe of the pedestal's antenna field pattern covers a first area of an interrogation zone.

Systems and methods for using radio frequency identification as an adaptive alarm threshold
10997381 · 2021-05-04 · ·

Systems and methods for operating an Electronic Article Surveillance (“EAS”) system. The methods comprise: detecting movement of a plurality of security tags in a facility using Radio Frequency Identification (“RFID”); identifying which security tags of the plurality of security tags are moving towards an exit of the facility or are in a surveillance zone; determining a number of the identified security tags that are coupled to unsold objects; comparing the number to a threshold value; and causing the EAS system to issue an alarm when the number is greater than or equal to the threshold value.

System for simultaneous tag triggering and sequential tag reading
10997840 · 2021-05-04 · ·

Embodiments of the present disclosure generally relate to systems, methods, and computer readable media containing instructions for causing simultaneous triggering and sequential reading of a plurality of tags. In one implementation, the instructions may include displaying an activatable element on a graphical user interface for activating a 2.4 GHz transmitter. The instructions may also include activating the transmitter to cause each of a plurality of tags to send a unique tag ID to a receiver. The instructions may also include reading a first group of tag IDs during a first time interval; recording first information associated with the first group; maintaining activation of the transmitter to cause transmission of at least some of the tag IDs of the first group along with the unique tag IDs of a second group of tag IDs to the receiver; and recording second information associated with the second group.

VALIDATING RADIO FREQUENCY IDENTIFICATION (RFID) ALARM EVENT TAGS

An RFID portal of an EAS system first interrogates a first zone extending into a controlled area beyond a threshold distance from an interrogating antenna of the portal. The portal defines an exit from the controlled area, the threshold distance being less than a width of the exit. The portal first detects, in response to the first interrogating, a first response of a particular RFID tag. The portal second interrogate, subsequent to the first detecting, in a second zone extending into the controlled area at least to the threshold distance. The portal second detects, in response to the second interrogating, at least one second response of the particular RFID tag indicating a received signal strength of the second interrogating at the particular RFID tag corresponding to a distance from an interrogating antenna of the portal less than the threshold distance. The EAS system alarms in response to the second detecting.

Wireless dual-mode identification tag
10991220 · 2021-04-27 · ·

Embodiments of the present disclosure generally relate to systems and methods for providing privacy to downstream owners of electronically tagged goods. In one implementation, the system may include at least one processor that may be configured to store IDs for a plurality of tags including at least a first owner ID and a second owner ID for a particular tag; associate first information of the particular tag with the first owner ID at a time when the first owner of the particular tag is recorded as owning the tag; record a transaction transferring ownership of the particular tag from the first owner to a second owner; and after the transfer of ownership, associate second information of the particular tag with the second owner ID, and prevent the first owner from accessing the second information.