G08B13/2465

DEVICE FOR AUTOMATED REMOVAL OF SECURITY TAGS AND ASSOCIATED SYSTEMS AND METHODS

Devices, systems, and methods for removing a security tag from an article are disclosed herein. A device for removing a security tag includes a housing including an opening positioned to receive the tag and at least a portion of the article. A magnet is supported adjacent the opening to retain a tag body and to release a retainer pin therefrom when the tag is inserted into the opening. A pin retractor is positioned in the housing opposite the magnet to capture the retainer pin and retract it from the tag body. The pin retractor is retracted into a collar to strip the pin from the pin retractor. A release frame is positioned proximate the magnet and movable between a first position wherein the magnet retains the tag body, and a second position wherein the tag body is moved away from the magnet, thereby releasing the tag body from the magnet.

Theft-prevention system and method with magnetic field detection
10950101 · 2021-03-16 · ·

An electronic theft-alerting system, including magnetometers, such as multiaxis magnetometers, arranged in respective stations and configured to output respective vector signals representing movement of respective magnetic field vectors; and a signal processor coupled to receive the first and second vector signals, and configured to detect a corresponding movement of a first magnetic field vector and a second magnetic field vector. Detecting commencement and continuance of fluctuation the first magnetic field vector, determining whether to raise or forgo to raise an alarm that warns about a possible theft-related event in response to the determining of commencement and continuance of fluctuation of the first magnetic field vector or the second magnetic field vector.

Monitoring system
11854358 · 2023-12-26 · ·

A monitoring system for deriving a measurement of a separation distance between a monitor and one or more tags, where each tag is adapted to be attached to or contained within an object to be monitored, comprises a monitor that is operable to trigger an event if the separation distance exceeds a set separation limit. A frequency of packet exchange between a tag and monitor is dynamically altered based on a comparison of one or more.

marCart
20210020002 · 2021-01-21 ·

A personal electronic shopping cart (marCart) having a portable scanning device to eliminate the common practice involving picking up a shopping cart from the store to load and unload then reload before exiting the store then unload again into your vehicle. The cart can be owned if purchased from its manufacturers or rented from a marCart Docking Station. The marCart can be hauled from behind any vehicle or humanly operated with its battery-powered mechanism. The marCart also come with Wireless Self Checkout Register to be installed inside of the store for check out purposes. The marCart Wireless Self Checkout Register connect to the marCart. The marCart size is designed in compliances with guidelines established by proper authority. For many years, people make the trip to the store to shop for many different items; groceries, clothes, etc . . . one common practice involve picking up a shopping cart, go inside of the store, pick items then place them in the shopping cart then go to the register remove every items, pay for them then place them back in the cart, push it outside the store unload then place in the vehicle. This old process is an inconvenient and tedious way to shop. The marCart is invented to give a better option to shoppers to make shopping more convenient and easier.

THEFT-PREVENTION SYSTEM AND METHOD WITH MAGNETIC FIELD DETECTION
20200294374 · 2020-09-17 · ·

An electronic theft-alerting system, including magnetometers, such as multiaxis magnetometers, arranged in respective stations and configured to output respective vector signals representing movement of respective magnetic field vectors; and a signal processor coupled to receive the first and second vector signals, and configured to detect a corresponding movement of a first magnetic field vector and a second magnetic field vector. Detecting commencement and continuance of fluctuation the first magnetic field vector, determining whether to raise or forgo to raise an alarm that warns about a possible theft-related event in response to the determining of commencement and continuance of fluctuation of the first magnetic field vector or the second magnetic field vector.

PROGRAMMABLE SECURITY SYSTEM AND METHOD FOR PROTECTING MERCHANDISE

A programmable security system and method for protecting an item of merchandise includes a programming station, a programmable key and a security system. The programming station generates a security code and communicates the security code to a memory of the programmable key. The programmable key initially communicates the security code to a memory of the security device and subsequently operates the security device upon a matching of the security code in the memory of the security device with the security code in the memory of the programmable key. The programmable key may also transfer power via electrical contacts or inductive transfer from an internal battery to the security device to operate a lock mechanism. The security code may be communicated by wireless infrared (IR) systems, electrical contacts or inductive transfer. A timer inactivates the programmable key and/or the security device after a predetermined period of time. A counter inactivates the programmable key after a predetermined maximum number of activations.

Programmable security system and method for protecting merchandise

A programmable security system and method for protecting an item of merchandise includes a programming station, a programmable key and a security system. The programming station generates a security code and communicates the security code to a memory of the programmable key. The programmable key initially communicates the security code to a memory of the security device and subsequently operates the security device upon a matching of the security code in the memory of the security device with the security code in the memory of the programmable key. The programmable key may also transfer power via electrical contacts or inductive transfer from an internal battery to the security device to operate a lock mechanism. The security code may be communicated by wireless infrared (IR) systems, electrical contacts or inductive transfer. A timer inactivates the programmable key and/or the security device after a predetermined period of time. A counter inactivates the programmable key after a predetermined maximum number of activations.

PROGRAMMABLE SECURITY SYSTEM AND METHOD FOR PROTECTING MERCHANDISE

A programmable security system and method for protecting an item of merchandise includes a programming station, a programmable key and a security system. The programming station generates a security code and communicates the security code to a memory of the programmable key. The programmable key initially communicates the security code to a memory of the security device and subsequently operates the security device upon a matching of the security code in the memory of the security device with the security code in the memory of the programmable key. The programmable key may also transfer power via electrical contacts or inductive transfer from an internal battery to the security device to operate a lock mechanism. The security code may be communicated by wireless infrared (IR) systems, electrical contacts or inductive transfer. A timer inactivates the programmable key and/or the security device after a predetermined period of time. A counter inactivates the programmable key after a predetermined maximum number of activations.

MONITORING SYSTEM
20240062638 · 2024-02-22 ·

A monitoring system for deriving a measurement of a separation distance between a monitor and one or more tags, where each tag is adapted to be attached to or contained within an object to be monitored, comprises a monitor that is operable to trigger an event if the separation distance exceeds a set separation limit. A frequency of packet exchange between a tag and monitor is dynamically altered based on a comparison of one or more

PROGRAMMABLE SECURITY SYSTEM AND METHOD FOR PROTECTING MERCHANDISE
20190272731 · 2019-09-05 ·

A programmable security system and method for protecting an item of merchandise includes a programming station, a programmable key and a security system. The programming station generates a security code and communicates the security code to a memory of the programmable key. The programmable key initially communicates the security code to a memory of the security device and subsequently operates the security device upon a matching of the security code in the memory of the security device with the security code in the memory of the programmable key. The programmable key may also transfer power via electrical contacts or inductive transfer from an internal battery to the security device to operate a lock mechanism. The security code may be communicated by wireless infrared (IR) systems, electrical contacts or inductive transfer. A timer inactivates the programmable key and/or the security device after a predetermine period of time. A counter inactivates the programmable key after a predetermined maximum number of activations.