Patent classifications
G08B13/2428
EAS device with installation switch and activating base
An electronic article surveillance device with an electronics housing and base attaches to an article to be protected. The housing and base have connecting interfaces which act together to attach the housing to the base. The housing has a switch on the underside and the base has an aperture partially covered by a flexible tab that aligns with the switch. The flexible tab normally protrudes away from the bottom surface of the base. When the base is attached to an article, the tab is pushed back into the aperture. When the housing is attached to the base, the switch contacts the tab. If the EAS device is removed from the base without disarming the device, the tab moves out of the aperture and allows the switch to detect the removal. The EAS device then issues an alarm. The flexible tab may a piercing element to pierce plastic wrapping, if present.
System and method for item self-assessment as being extant or displaced
A portable item reporting device (200) is configured to be attached to and in substantial collocation with a portable item (100), or to be integrated into a portable item (100). The device (200) includes environmental sensors (210) to monitor item location, movement, ambient light, sounds, temperature, etc. The device (200) is configured to store usage expectation data (600) indicative of historical and/or expected item usage and environments when the item (100) is in normal use/storage associated with an authorized user (AU). The device (200) monitors current environmental conditions (104) surrounding and pertaining to the item. If the current environment (104) is inconsistent with expected conditions (600), the device (200) assesses that the item (100) is displaced (503.0), meaning either that the item (100) is in abnormal use or abnormal storage, or is under the control of an unauthorized user (UU) who is other than the authorized user (AU). Based on the assessment the device initiates a signal (372) or message (374) to an authorized user (AU) of the item (100), indicating that the item (100) usage/storage is displaced (503.0) or otherwise anomalous (503.2).
MERCHANDISE DISPLAY SECURITY SYSTEMS AND METHODS
Merchandise security systems and methods are provided. In one example, a merchandise security system includes a plurality of security devices arranged in a wireless network, wherein the plurality of security devices are arranged in a planogram and each configured to protect one or more items from theft, each of the plurality of security devices configured to wirelessly communicate data with a remote device. The system also includes a plurality of electronic keys arranged in the wireless network and configured to wirelessly communicate data with the plurality of security devices and/or the remote device. Each of the plurality of electronic keys is configured to operate the plurality of security devices. The system also includes a gateway configured to receive the data from the plurality of security devices and electronic keys via wireless communication, wherein the gateway is configured to communicate the data to the remote computing device.
Power supply package with built-in radio frequency identification tag
A method includes providing a power supply package (PSP) that includes a power supply, an RFID tag, and a power switch, where a control terminal of the power switch is coupled to an output terminal of the RFID tag, and load path terminals of the power switch are coupled between an output terminal of the PSP and a first terminal of the power supply, where a control register of the RFID tag is pre-programmed with a first value such that the RFID tag is configured to generate a first control signal that turns off the power switch; receiving, by the RFID tag, a second value for the control register of the RFID tag; and writing, by the RFID tag, the second value to the control register of the RFID tag such that the RFID tag is configured to generate a second control signal that turns on the power switch.
Anticipation and warning of potential loss/theft for portable personal items
Personal portable items are subject to potential loss or misplacement by their owners or authorized users. A system and method is operative with personal portable items which are locally associated with a processor, memory, and sensors (either built-in or via attached sensing device). The memory stores environmental parameters which indicate a potential chance or possibility that an item may be lost, stolen, or misplaced in the near-term, proximate future. The stored parameters are customized to the historical or expected uses of the portable item by a particular user or owner in particular, user-specific contexts. The sensors sense the environment of the portable item in real-time. If the sensed environment or sensed item usage matches the environmental parameters which indicate risk of loss or misplacement, an alert element signals the portable item's user, enabling the user to take anticipatory action to prevent item loss. In an embodiment, at least one first portable item of two or more portable items which are both intended to be substantially on-person of an authorized user, is configured to monitor a status of a second other portable item with which it is paired. If the first portable item detects an anomalous status of the second portable item, the first portable item alerts the authorized user that the second item is at risk of being lost, misplaced, or stolen.
Processor-Based Learning of User-Specific Uses of Portable Items
A portable item reporting device (PIRD) automatically learns a use of a portable item which is selected by an owner or authorized user of the portable item, where the PIRD is configured to be attached to and in substantial collocation with the selected portable item, or to be integrated into the portable item. The PIRD includes environmental monitors which monitor item location, item movement, and/or other environmental factors. The PIRD detects obtains and analyzes environmental data during usage of the portable item by the authorized user, or during user-designated storage of the portable item in a storage location. The PIRD further identifies and/or learns, based on the detected environmental data, one or more repeated patterns and/or context-determined patterns of usage or physical storage of the user's portable item. The PIRD then stores the past, learned pattern(s) of usage data as indicative of expected and/or normal, future use/storage by the authorized user of the portable item. In some embodiments, the PIRD includes linking elements to ensure that the PIRD remains attached to, and/or in substantial colocation with, a designated portable item of an owner or authorized user.
Merchandise display security systems and methods
Merchandise security systems and methods are provided. In one example, a merchandise security system includes a plurality of security devices arranged in a wireless network, wherein the plurality of security devices are arranged in a planogram and each configured to protect one or more items from theft, each of the plurality of security devices configured to wirelessly communicate data with a remote device. The system also includes a plurality of electronic keys arranged in the wireless network and configured to wirelessly communicate data with the plurality of security devices and/or the remote device. Each of the plurality of electronic keys is configured to operate the plurality of security devices. The system also includes a gateway configured to receive the data from the plurality of security devices and electronic keys via wireless communication, wherein the gateway is configured to communicate the data to the remote computing device.
Foreign RFID tag discrimination and management
Managing foreign RFID tags within a secured area involves use of a first RFID portal system to read tag data from an RFID tag present within a first portal zone. A processing device associated with the first RFID portal system is used to determine whether the RFID tag is entering the secured area. The determination is based on an evaluation of a direction of travel of the RFID tag through the first portal zone. Responsive to determining that the RFID tag is in fact entering the secured area, one or more operations are performed to cause a first tag value corresponding to the tag data to be added into a safe to exit (STE) list.
Eye Glasses with Individual User Awareness
A portable item reporting device (PIRD) is configured to detect an individual person's use of conventional consumer eyeglasses. A PIRD includes a microprocessor, memory, one or more environmental detectors (such as optical detectors, motion detectors, cameras, and location detectors, as well as timer elements and possibly calendar elements. With the integrated electronics, the eyeglasses with PIRD may self-identify contexts in which the glasses may be lost, stolen, or misplaced. The eyeglasses with PIRD may also identify when the glasses have been covered over with papers or other objects (such as when set down on a desk), so that the owner of glasses may be at risk of losing or forgetting the glasses. A camera of the glasses may also maintain an ongoing record of user activity when the user is wearing the glasses. The record may aid the user in later identifying other personal items which the user set down and forgot to pick up again.
MERCHANDISE DISPLAY SECURITY SYSTEMS AND METHODS
Merchandise security systems and methods are provided. In one example, a merchandise security system includes a plurality of security devices arranged in a wireless network, wherein the plurality of security devices are arranged in a planogram and each configured to protect one or more items from theft, each of the plurality of security devices configured to wirelessly communicate data with a remote device. The system also includes a plurality of electronic keys arranged in the wireless network and configured to wirelessly communicate data with the plurality of security devices and/or the remote device. Each of the plurality of electronic keys is configured to operate the plurality of security devices. The system also includes a gateway configured to receive the data from the plurality of security devices and electronic keys via wireless communication, wherein the gateway is configured to communicate the data to the remote computing device.