G08B13/248

Method and apparatus for saving system power
11580834 · 2023-02-14 · ·

Theft increases the average product cost to consumers. A mentoring system is presented that can help to reduce or prevent the inventory from lost or theft. Theft is a serious concern in the consumer market place. Industry loses billions per year on theft of merchandise. According to a Reuters report, last year, thefts by employees of U.S. retail merchandise accounted for $15.9 billion, or 44 percent of theft losses at stores, more than shoplifting and vendor fraud combined. Thus, the total thief by the customers and store employees during the year 2008 amounted to $36 billion. Several embodiments of ways to control or reduce the thefts in the market place are presented.

Theft prediction and tracking system
11710397 · 2023-07-25 ·

Systems and methods for detecting potential theft and identifying individuals having a history of committing theft use an electromagnetic emission associated with a personal electronic device associated with an individual is received from at least one of a sensor that is coupled to at least one of a traffic camera or an aerial drone camera. One or more signal properties of the electromagnetic emission are analyzed to determine an emission signature. Video data and video analytics are correlated with the emission signature to identify the individual having possession of the item. The emission signature and video data are stored for later use during a checkout procedure. If an emission signature detected at a checkout station matches that of the individual having possession of the item, and the item is not processed through the checkout station, an alert is issued and the individual is flagged as a potential shoplifter.

SYSTEM FOR AND METHOD OF DETERRING THEFT OF ITEMS FROM A VENUE
20180012466 · 2018-01-11 ·

Theft of an item from a department of a venue having a department-specific, point-of-sale (POS) station for completing a transaction of the item prior to authorized removal of the item from the department, is deterred by sensing and tracking movement of a target associated with the item from the department by deploying a plurality of sensing units overhead at the venue, and by generating an alert when the sensing units sense and track that the target associated with the item has bypassed the department-specific POS station without the transaction having been completed for the item at the department-specific POS station. Security personnel execute a theft-deterrent action in response to the alert.

Systems and methods for deactivation frequency reduction using a transformer

Systems and methods for deactivating an Electronic Article Surveillance (“EAS”) tag. The methods comprising: using an AC drive signal to charge an energy storage component of the tag deactivator; selectively actuating a switch so that a closed circuit is formed between the energy storage component and at least one deactivation coil of the tag deactivator; generating a tag deactivation field to deactivate the EAS tag by energizing the at least one deactivation coil with current supplied from the energy storage component; and using a step down transformer, disposed between the energy storage component and the at least one deactivation coil, to decrease a frequency of a decaying coil current waveform representing a current flowing through the at least one deactivation coil.

Methods and systems for classifying tag status in a retail environment

Examples described herein generally relate to a system for monitoring tags in a retail environment. The system includes an exit system including one or more sensors that read a tag to obtain exit system measurements associated with a tag detection event. The system includes a memory and a processor configured to execute instructions to receive a selection of a base configuration, the base configuration including weighting values for a plurality of exit system measurements. The processor may classify a tag detection event into a first tag status for the tag detection event based on application of the weighting values to exit system measurements associated with the tag detection event. The processor may determine a second tag status of the tag after the tag detection event. The processor may update the weighting values using a machine-learning algorithm based on at least the first tag status and the second tag status.

System and method for foil detection using millimeter wave for retail applications

In an aspect, the present disclosure includes a system for detecting metal foil using millimeter wave (mmWave) for retail applications. The system comprises one or more pedestals positioned to define an exit portal leading to a point of exit, one or more security tag readers, fixedly positioned with the one or more pedestals, configured to read data from a security tag passing through the exit portal and one or more mmWave receivers, fixedly positioned near the point of exit, configured to receive one or more reflected mmWave beams from metal foil, wherein the detection of metal foil results in an alert message.

Condition-responsive wearable device for sensing and indicating proximity of an article with a specific characteristic

A condition-responsive wearable device for sensing and indicating proximity of an article with a specific characteristic includes a processor and a sensor. The sensor is configured to detect an article with two or more information sources within a predetermined distance of the sensor. The information sources contain characteristic information of the article. The wearable device also includes a memory storing instructions that, when executed by the processor, cause the processor to receive predefined characteristic information, select detected characteristic information from at least two of the information sources to compare with the predefined characteristic information, and compare the selected detected characteristic information with the predefined characteristic information. The wearable device includes an indicator configured to generate an alarm in response to detecting a match between the selected detected characteristic information and the predefined characteristic information.

GENERATING WATCH LISTS FOR RETAIL STORES BASED ON UNSTRUCTURED DATA AND SYSTEM-BASED INFERENCES
20230005345 · 2023-01-05 ·

Described herein are systems and methods for generating a watch list of users who pose specific security threats to a store. The method can include retrieving, by a computer system from a data store, case files that document activity that poses a security threat by a user at the store, predicting, based on applying prediction models to the case files, future activity associated with the case files, determining threat scores for the case files based on the predicted future activity, ranking the case files into a candidate list from highest to lowest threat score, generating a watch list for the store that includes a subset of the ranked case files based on which case files pose a greatest current threat to the store, generating summary videos for each case file in the watch list, and transmitting the watch list and summary videos to a user device.

Retail Point of Sale Security System
20220398884 · 2022-12-15 ·

The present disclosure is the only product of its kind that incorporates an advanced technology in keeper boxes to enhance protection protocols and sale security in retail locations. This disclosed product is uniquely designed with durable materials to ensure sustainability and a sound alarm to notify authorities and/or near by staff securities, if the device is being moved, tampered with or broken into, immediately. The disclosure includes an electronic security box made of a metal and comprising five contiguous sides and defining an open sixth side. The disclosure also includes a metal lid configured to fit the sixth side of the metal box and create an enclosure. The disclosure further includes a base configured to electronically interact with the metal lid and with the metal box via a proximity thereto.

Systems and methods for increasing alarm confidence in EAS detection systems

Systems and methods for operating an EAS detection system. The methods comprise: detecting an Active Security Tag (“AST”) in an EAS detection zone; determining whether AST is coupled to an object identified in a list; and performing operations when a determination is made that AST is coupled to a listed object. The operations involve: accessing sensor data generated by at least one sensor device disposed on/near display equipment associated with the listed object; processing the sensor data to determine whether a person was within a defined distance range of AST during a period of time immediately preceding the detecting; concluding that a false alarm scenario exists when the sensor data indicates that a person was not within the defined distance range of AST during the period of time; and suppressing alarm issuance by the EAS detection system in response to the false alarm scenario conclusion.