G08B13/2485

SECURITY TAG
20230237891 · 2023-07-27 · ·

A security tag including a flexible member that can be formed into a loop to attach the security tag to an article. A security tag comprises: a main body comprising a casing that comprises a first aperture proximate a first end wall and a second aperture proximate a second end wall; an elongate flexible member, a first end of the flexible member extending through the first aperture; a releasable locking mechanism in the main body and associated with the second aperture, the locking mechanism configured to retain a second end of the flexible member; and two electronic article surveillance sensors within the casing, the sensors on opposite sides of a plane disposed halfway between the first and second apertures. When the second end of the flexible member is retained in the casing by the locking mechanism, a centre of gravity of the main body lies in the plane.

Systems and methods for spatial sensing and tracking of objects in a space
11514765 · 2022-11-29 · ·

This disclosure is directed to product displays systems. In one aspect, a product display system includes three or more bases spatially distributed in a space. Each base has a wireless transceiver. The system includes a product display assembly comprising a puck assembly and a base assembly. The puck assembly has a surface on which a product is mountable for merchandising of the product to a customer and is untethered to the base assembly. The puck assembly executes machine-readable instructions that determines a coordinate location of the puck assembly within the space based on wireless communications between the puck assembly and the three or more bases. The puck assembly may also generate an alarm sound when the coordinate location is located within an alarm zone or a warning zone of the space.

Detecting interactions with storage units based on RFID signals and auxiliary signals

Storage units including platforms that are outfitted with RFID antennas and auxiliary sensors detect changes in loading on the platforms based on changes in loading determined by the auxiliary sensors or changes in signals received by the RFID antennas. The platforms include surfaces for receiving items tagged with RFID transmitters thereon, such as items of common types and variable weights. An interaction involving the placement of an item on the platform, or the removal of the item from the platform, is detected by the auxiliary sensors. The energization of an RFID field is triggered in response to the detected interaction, and an item is identified where an RFID signal transmitted by the item is present at one time and absent at another time.

Security tag
11640754 · 2023-05-02 · ·

This invention relates to a security tag for use in a retail environment. In particular this invention relates to a security tag including a flexible member or lanyard that can be formed into a loop to attach the security tag to an article. A security tag comprises a main body comprising a casing having opposite first and second end walls; an elongate flexible member for securing around an object, a first end of the flexible member being connected to the main body; a releasable locking mechanism in the main body, the locking mechanism configured to retain a second end of the flexible member within the casing such that a part of the flexible member external to the casing forms a loop, the locking mechanism being releasable by application of a magnetic force such that the second end of the flexible member can be withdrawn from the casing; and two electronic article surveillance (EAS) sensors housed within the casing, a first one of the sensors being proximate the first end wall of the casing and a second one of the sensors being proximate the second end wall of the casing.

Electronic article surveillance

The present invention discloses a point of sale (POS) structure that is includes an Electronic Article Surveillance (EAS) system.

Validating radio frequency identification (RFID) alarm event tags

An RFID portal of an EAS system first interrogates a first zone extending into a controlled area beyond a threshold distance from an interrogating antenna of the portal. The portal defines an exit from the controlled area, the threshold distance being less than a width of the exit. The portal first detects, in response to the first interrogating, a first response of a particular RFID tag. The portal second interrogate, subsequent to the first detecting, in a second zone extending into the controlled area at least to the threshold distance. The portal second detects, in response to the second interrogating, at least one second response of the particular RFID tag indicating a received signal strength of the second interrogating at the particular RFID tag corresponding to a distance from an interrogating antenna of the portal less than the threshold distance. The EAS system alarms in response to the second detecting.

Theft prevention for returned merchandise

Consistent with disclosed embodiments, systems, methods, and computer readable media for electronic security systems for preventing theft of returned goods may be provided. Embodiments may include an electronic article surveillance (EAS) gate in an establishment and at least one receiver configured to receive transmissions from wirelessly transmitting tags. Embodiments may also include at least one processor configured to receive, from a mobile communications device associated with a previous purchaser, a notification of intent to return a previously purchased product to the establishment; identify a unique tag ID of a specific wirelessly transmitting tag associated with the previously purchased product; update a data structure to indicate that the previously purchased product was returned to the establishment; and enable an ability to initiate an alarm when the at least one receiver receives a transmission from the specific tag associated with the previously purchased product in proximity to the EAS gate.

ARRANGEMENT AND METHOD FOR FITTING ROOMS
20170316665 · 2017-11-02 · ·

An arrangement and method for fitting rooms and/or fitting areas. The arrangement includes detecting arrival, departure and/or presence of a person to/from a fitting room and/or fitting area and for detecting presence and/or number of remotely readable identification tags, electronic article surveillance tags and/or electronic price labels. The method includes detecting entrance or presence of a person to a fitting room and/or fitting area, detecting presence and/or number of remotely readable identification tags, electronic article surveillance tags and/or electronic price labels in the fitting room and/or fitting area after the entrance of a person to the fitting room and/or fitting area detecting departure of a person from a fitting room and/or fitting area and detecting presence and/or number of remotely readable identification tags, electronic article surveillance tags and/or electronic price labels in the fitting room and/or fitting area after departure of the person.

Apparatus for managing article for vehicle and method thereof

An apparatus for managing an article for a vehicle and a method thereof are provided to register various articles to which an ID tag is attached and which are provided from a user. The user is notified as to whether an article corresponding to a user situation is mounted on the vehicle to improve user convenience for various activities associated with a vehicle. The apparatus includes an input device that receives information about an article to which an ID tag is attached from a user and a communicator that communicates with an ID tag attached to the article. A controller manages the article to which the ID tag is attached and provides a notification to a user as to whether an article corresponding to a user situation is mounted on the vehicle.

RFID loss-prevention based on transition risk
11244282 · 2022-02-08 · ·

An RFID loss-prevention system (LPS) may monitor RFID-tagged items in a facility. An RFID reader transmits a first inventory command configured to cause tags in a first state to respond, receive a reply from a first tag, determine that the first tag has a low transition risk, and cause the first tag to switch to a second state. The reader may also receive a reply from a second tag, determine that the second tag has a high transition risk, and cause the second tag to remain in the first state. The reader may then transmit a second inventory command configured to cause tags in the first state to respond, receive a reply from the second tag in response to the second inventory command, determine that the second tag has inappropriately exited the facility, and issue an alert.