G06K19/0711

Piezoelectric energy hunting device with lightweight design and voltage signal application system thereof

A piezoelectric energy hunting device and a voltage signal application system thereof are disclosed. The piezoelectric energy hunting device includes a plurality of curved piezoelectric elements, a plurality of rigid foams, and a flexible foam structure. The plurality of curved piezoelectric elements are arranged side by side with one another, wherein each curved piezoelectric element is attached to one of the rigid foams. The flexible foam structure includes a top foam and a bottom foam covering the outer surface of the plurality of curved piezoelectric elements and the plurality of rigid foams; when the flexible foam structure is compressed, the plurality of curved piezoelectric elements are simultaneously deformed, thereby generating a voltage signal. When the flexible foam structure is not compressed, the flexible foam structure and the plurality of rigid foams provide an elastic force to restore the plurality of curved piezoelectric elements.

HYBRID DOCUMENT WITH VARIABLE STATE

A hybrid document includes a document having visible markings, one or more light-controlling elements embedded in or on the document, and a controller including a circuit having a non-volatile memory. The controller is embedded in or on the document and electrically connected to the one or more light-controlling elements for controlling the one or more light-controlling elements. A power input connection is electrically connected to any one or all of the controller, the circuit, the memory, or the one or more light-emitting elements. The memory stores a state and the circuit causes the one or more light-controlling elements to indicate the state. A hybrid document validation machine is adapted to accept one or more of the hybrid documents, change the state of the hybrid documents, and optionally display the state on a display.

Method and device for detecting unauthorized tranfer between persons
11341393 · 2022-05-24 ·

A method of confirming the identity of a person who issued a token to signify eligibility for a privilege. Possession token is confirmed to be by the same person by using sensors in the token which track the movements of the person. A machine learning system is trained to evaluate the sensor data detecting transfer of possession of the token. The state of continuous possession since the token was issued or set to an enabled state is confirmed and the privilege is granted. The method of identity confirmation is used in various contexts such as for to control entry to a location, use of a facility or service. It is also useful to determine continuous possession of a weapon to prevent misuse after the weapon is stolen, dropped or lost. Servers, beacons and outside sources of data or inputs to be measured by the sensor can also be used.

REMOTELY DETECTABLE AMMUNITION
20220128342 · 2022-04-28 ·

Disclosed is tagged ammunition, methods for making it, using it and detecting it to reduce gun violence. When implemented together with a smart phone coupled readers, standalone readers, or at a security center, software is included to allow integration of signals detected by multiple readers in the vicinity to map detectable ammunition detected by readers designed to detect tagged ammunition as a proxy for loaded firearms. This makes possible securing an area of interest, when combined with placing of at least one networkable reader in the vicinity of the area of interest; and connecting the one or more readers to a monitoring center. Such monitoring centers may be associated with schools, shopping malls, streets, public meetings, public events, housing complexes, an area being swept for loaded guns, an area being monitored for gang activity, or even a residence.

Remotely detectable ammunition
11215432 · 2022-01-04 ·

Disclosed is tagged ammunition, methods for making it, using it and detecting it to reduce gun violence. When implemented together with a smart phone coupled readers, standalone readers, or at a security center, software is included to allow integration of signals detected by multiple readers in the vicinity to map detectable ammunition detected by readers designed to detect tagged ammunition as a proxy for loaded firearms. This makes possible securing an area of interest, when combined with placing of at least one networkable reader in the vicinity of the area of interest; and connecting the one or more readers to a monitoring center. Such monitoring centers may be associated with schools, shopping malls, streets, public meetings, public events, housing complexes, an area being swept for loaded guns, an area being monitored for gang activity, or even a residence.

Method and device for detecting unauthorized transfer between persons
11783159 · 2023-10-10 ·

A method of confirming the identity of a person who issued a token to signify eligibility for a privilege. Possession token is confirmed to be by the same person by using sensors in the token which track the movements of the person. A machine learning system is trained to evaluate the sensor data detecting transfer of possession of the token. The state of continuous possession since the token was issued or set to an enabled state is confirmed and the privilege is granted. The method of identity confirmation is used in various contexts such as for to control entry to a location, use of a facility or service. It is also useful to determine continuous possession of a weapon to prevent misuse after the weapon is stolen, dropped or lost. Servers, beacons and outside sources of data or inputs to be measured by the sensor can also be used.

METHOD AND DEVICE FOR DETECTING UNAUTHORIZED TRANFER BETWEEN PERSONS
20220284258 · 2022-09-08 ·

A method of confirming the identity of a person who issued a token to signify eligibility for a privilege. Possession token is confirmed to be by the same person by using sensors in the token which track the movements of the person. A machine learning system is trained to evaluate the sensor data detecting transfer of possession of the token. The state of continuous possession since the token was issued or set to an enabled state is confirmed and the privilege is granted. The method of identity confirmation is used in various contexts such as for to control entry to a location, use of a facility or service. It is also useful to determine continuous possession of a weapon to prevent misuse after the weapon is stolen, dropped or lost. Servers, beacons and outside sources of data or inputs to be measured by the sensor can also be used.

PIEZOELECTRIC ENERGY HUNTING DEVICE WITH LIGHTWEIGHT DESIGN AND VOLTAGE SIGNAL APPLICATION SYSTEM THEREOF
20210151662 · 2021-05-20 ·

A piezoelectric energy hunting device and a voltage signal application system thereof are disclosed. The piezoelectric energy hunting device includes a plurality of curved piezoelectric elements, a plurality of rigid foams, and a flexible foam structure. The plurality of curved piezoelectric elements are arranged side by side with one another, wherein each curved piezoelectric element is attached to one of the rigid foams. The flexible foam structure includes a top foam and a bottom foam covering the outer surface of the plurality of curved piezoelectric elements and the plurality of rigid foams; when the flexible foam structure is compressed, the plurality of curved piezoelectric elements are simultaneously deformed, thereby generating a voltage signal. When the flexible foam structure is not compressed, the flexible foam structure and the plurality of rigid foams provide an elastic force to restore the plurality of curved piezoelectric elements.

SYSTEMS AND METHODS FOR MONITORING MOTION AND APPLICATIONS THEREOF

In one aspect, systems for monitoring motion are described herein. A system for monitoring motion comprises a battery component in electrical communication with an energy storage component via a momentary operation switch that is closed by movement of the system, The system also comprises a signaling component providing a signal in response to the energy storage component reaching a minimum energy threshold.

Systems and methods for providing a tag with a miniature zero power motion detector and energy harvester

Systems and methods for operating a tag. The method comprising: causing motion of a spherical permanent magnet which is disposed and freely movable in a three dimensional internal space of a non-magnetic hollow sphere located within the tag; using the spherical permanent magnet's motion to cause a change in a magnetic flux in a wire wrapped around at least a portion of the non-magnetic hollow sphere, where the change in the magnetic flux induces a current in the wire; and supplying the current to at least one device of the tag's internal electronic devices that is configured to facilitate at least one of an inventory count and an inventory security.