Patent classifications
G08B13/2474
Shielded pedestal with see-thru capability
Systems and methods for operating a pedestal of an Electronic Article Surveillance (EAS) system. The methods comprise: performing tag detection operations by a circuit of a first pedestal to detect an active security tag located in an EAS detection zone of the EAS system; and performing open-look operations by the circuit of the first pedestal simultaneously with the tag detection operations, where the open-look operations cause a portion of the first pedestal that is formed of an opaque material (1) to appear at least partially transparent or (2) to appear as if the portion has at least one aperture formed therethrough.
Anti-theft electronic seal
A bolt includes a conductor having an accommodation hole and a circuit board installed in the accommodation hole, where the upper part of the conductor is covered with an insulating sleeve, and the lower part thereof is configured with a first engagement portion, a RFID chip and lower contact of the circuit board is formed into a control circuit, and the lower contact is allowed to be protruded out of the bottom end of the accommodation hole. An antenna and elastic sheet are configured inside the bolt seat, and the outer peripheral thereof is configured with an insertion hole and second engagement portion adapted to position the first engagement portion, the elastic sheet have a pre-pressure to allow the antenna, control circuit and conductor to be in electric connection with one another. Whereby, the electric connection can be interrupted when the bolt is cut.
PEDESTAL WITH EMBEDDED CAMERA(S) FOR BEAM STEERING
Systems and methods for operating a pedestal of an Electronic Article Surveillance (EAS) system. The methods comprise: capturing at least one first image or video by a camera coupled to the pedestal; analyzing the at least one first image or video to detect a person's presence and determine the person's location relative to the camera; determining a first beam pointing direction for the pedestal based on results of the analysis of the at least one first image or video; and steering a read beam of the pedestal in accordance with the first beam pointing direction so that a main lobe of the pedestal's antenna field pattern covers a first area of an interrogation zone.
TAG WITH ORIENTATION INDEPENDENT ANTENNA
A tag incorporated with a directional antenna. Directional antennas may utilize devices equipped with orientation-independent antennas to determine the location of radio frequency signals emitted by other objects. The system can exist in many different customizable configurations, sometimes utilizing orientation-independent antennas embedded in the tag.
Systems and methods for providing a pedestal with collision damage protection
A pedestal for an Electronic Article Surveillance (EAS) system. The pedestal comprising: a frame; at least one antenna disposed in or coupled to the frame; and a rotatable member directly coupled to the frame so as to mechanically support the pedestal in a vertical position when in use and configured to allow the frame to transition from the vertical position to an angled position when a force is applied to the frame by an external object.
ANTI-THEFT ELECTRONIC SEAL
A bolt includes a conductor having an accommodation hole and a circuit board installed in the accommodation hole, where the upper part of the conductor is covered with an insulating sleeve, and the lower part thereof is configured with a first engagement portion, a RFID chip and lower contact of the circuit board is formed into a control circuit, and the lower contact is allowed to be protruded out of the bottom end of the accommodation hole. An antenna and elastic sheet are configured inside the bolt seat, and the outer peripheral thereof is configured with an insertion hole and second engagement portion adapted to position the first engagement portion, the elastic sheet have a pre-pressure to allow the antenna, control circuit and conductor to be in electric connection with one another. Whereby, the electric connection can be interrupted when the bolt is cut.
System for monitoring and controlling shopping cart usage
A system for monitoring and controlling shopping cart usage comprises a wheel assembly that attaches to a shopping cart. In some embodiments the wheel assembly includes a wheel, a brake that can be activated to inhibit rotation of the wheel, a controller that controls the brake, a VLF receiver, and an RF transceiver. The RF transceiver may, for example, operate in a 2.4 GHz frequency band. In some implementations, the RF transceiver may be used to detect entry of the shopping cart into a checkout area of the store, and the VLF receiver may be used to detect that the shopping cart is exiting the store. The controller may activate the brake if the shopping cart attempts to exit the store without first passing through a checkout area.
SHIELDED PEDESTAL WITH SEE-THRU CAPABILITY
Systems and methods for operating a pedestal of an Electronic Article Surveillance (EAS) system. The methods comprise: performing tag detection operations by a circuit of a first pedestal to detect an active security tag located in an EAS detection zone of the EAS system; and performing open-look operations by the circuit of the first pedestal simultaneously with the tag detection operations, where the open-look operations cause a portion of the first pedestal that is formed of an opaque material (1) to appear at least partially transparent or (2) to appear as if the portion has at least one aperture formed therethrough.
Facilitating ML algorithm contribution to use cases where data is prohibitive
Example aspects include techniques for building a ML model in a use case with prohibitive training data and employing the ML model within the use case. These techniques may include determining training information including a plurality of stray training reads and a plurality of valid training reads, determining modified training information based at least in part on modifying the plurality of valid training reads, and generating a model for distinguishing a valid read from a stray read based on the modified training information and an evolutionary algorithm. In addition, the techniques may include detecting, by a monitoring device, a plurality of tag reads in response to a plurality of interactions between a tag and the monitoring device, and determining, by the monitoring device, a plurality of valid tag reads based on the model and plurality of tag reads.
Electronic tamper detection device
According to a first aspect of the present disclosure, an electronic tamper detection device is provided, comprising a radio frequency antenna, a tamper loop, a power level determination unit and a tamper measurement unit, wherein: the power level determination unit is configured to determine a power level of the tamper detection device; the tamper measurement unit is configured to generate a measurement signal and to transmit said measurement signal through the tamper loop; the tamper measurement unit is further configured to adapt the measurement signal in dependence on the power level. According to a second aspect of the present disclosure, a corresponding tamper detection method is conceived. According to a third aspect of the present disclosure, a corresponding non-transitory computer-readable storage medium comprising instructions is provided.