Patent classifications
G08B13/2402
System and method for deterring theft
A theft deterring system includes a power tool with a motor connectable to a power source, a switch connected to the motor, a controller controlling to the switch for controlling an amount of power provided to the motor, and a state circuit having a memory for storing a state value. The controller activates the switch to provide power to the motor when the state value stored in the memory equals a desired value. The system may also include a tag programmer for changing the stored value.
System and method for foil detection using millimeter wave for retail applications
In an aspect, the present disclosure includes a system for detecting metal foil using millimeter wave (mmWave) for retail applications. The system comprises one or more pedestals positioned to define an exit portal leading to a point of exit, one or more security tag readers, fixedly positioned with the one or more pedestals, configured to read data from a security tag passing through the exit portal and one or more mmWave receivers, fixedly positioned near the point of exit, configured to receive one or more reflected mmWave beams from metal foil, wherein the detection of metal foil results in an alert message.
Mobile device case for secured access and improvements
Mobile device cases are provided which, in a first embodiment, selectively limit a user's ability to control the user's own mobile electronic device. The case includes front and rear portions joined together and defining therein an opening for receiving a mobile electronic device, such as a mobile phone. A locking mechanism is provided for selectively securing the opening in a first locked position to prevent operational access to the mobile electronic device by the user until a predetermined condition is met. The case includes an indicia of time visible to the user during the period of time of prevented operational access. In a further embodiment, a case is provided with first and second polymeric shells each having an interior and an exterior surface thereon and connected together by at least one hinge portion. The first and second shell portions form a cavity of sufficient size to cover a mobile electronic device sufficiently to prevent access by its user. Tamper resistant and ultrasonic sensor defeating mobile device case embodiments are also contemplated by this invention.
Multiple-factor verification for vision-based systems
A system and method for interaction monitoring in a retail environment that includes executing a first monitoring system and thereby generating a first evaluation of customer selection of items; executing a second monitoring system and thereby generating a second evaluation of customer selection of items; determining monitoring alignment between the first evaluation and the second evaluation of a first customer; and triggering an action in response to the monitoring alignment.
MOBILE DEVICE CASE FOR SECURED ACCESS AND IMPROVEMENTS
Mobile device cases are provided which, in a first embodiment, selectively limit a user's ability to control the user's own mobile electronic device. The case includes front and rear portions joined together and defining therein an opening for receiving a mobile electronic device, such as a mobile phone. A locking mechanism is provided for selectively securing the opening in a first locked position to prevent operational access to the mobile electronic device by the user until a predetermined condition is met. The case includes an indicia of time visible to the user during the period of time of prevented operational access. In a further embodiment, a case is provided with first and second polymeric shells each having an interior and an exterior surface thereon and connected together by at least one hinge portion. The first and second shell portions form a cavity of sufficient size to cover a mobile electronic device sufficiently to prevent access by its user. Tamper resistant and ultrasonic sensor defeating mobile device case embodiments are also contemplated by this invention.
MULTIPLE-FACTOR VERIFICATION FOR VISION-BASED SYSTEMS
A system and method for interaction monitoring in a retail environment that includes executing a first monitoring system and thereby generating a first evaluation of customer selection of items; executing a second monitoring system and thereby generating a second evaluation of customer selection of items; determining monitoring alignment between the first evaluation and the second evaluation of a first customer; and triggering an action in response to the monitoring alignment.
Identifying user-item interactions in an automated facility
Techniques for employing user interfaces to output information indicative of events occurring in an inventory facility, and receive feedback from a human regarding the events are described herein. In one implementation, an event may take place in an inventory facility, such as a customer taking an item from an inventory location, returning an item to an inventory location, and so forth. An automated system of an inventory management system may process sensor data collected by sensors in the inventory facility to determine details of the event. In some examples, the inventory management system is unable to determine with a high level of confidence what occurred during the event. The inventory management system may provide the sensor data to a human associate through an associate interface, and receive input regarding details of the event from the human associate through the associate interface.
Interfacing electronic anti-tamper devices with display elements
An anti-tamper device combining a RFID component and an article surveillance or security component with a visual indicator. The article surveillance or security component is operatively coupled to a display so that an interruption of the RFID component is visibly indicated by the display. The visual indicator moves between a first state indicating a lack of tampering, and a second state indicating tampering without the need for a battery or external power source.
DETERMINING THE STATUS OF A TRACKING DEVICE BASED ON ORIENTATION
A battery-powered tracking device may comprise a processor and orientation sensors that generate orientation signals and provide them to a processor. The processor may use the orientation signals, or orientation values corresponding thereto, to determine whether or not the tracking device has moved during a configured no-change period relative to a baseline orientation that was determined before the no-change period. The no-change period may be selected to correspond to an amount of time during which the tracking device, or an item with which it is associated, such as a vehicle, tool, or shipping package, is not expected to move. If a determination is made during the no-change period that the tracking device has changed orientation, an alert may be sent to a tracking application to notify a user of the application that the tracking device may have been removed from the item with which is it associated.
SYSTEM AND METHOD FOR DETERRING THEFT
A theft deterring system includes a power tool with a motor connectable to a power source, a switch connected to the motor, a controller controlling to the switch for controlling an amount of power provided to the motor, and a state circuit having a memory for storing a state value. The controller activates the switch to provide power to the motor when the state value stored in the memory equals a desired value. The system may also include a tag programmer for changing the stored value.