Example implementations include a method, apparatus and computer-readable medium for computer vision detection of dwell time, comprising receiving a plurality of indications of persons entering an environment over a period of time. The implementations further include adding, into a first-in-first-out (FIFO) queue, a respective identifier of a respective person entering the environment and an entry time for each of the plurality of indications, removing, from the FIFO queue, the respective identifier and the entry time of the respective person in response to an indication of an exit of the respective person from the environment at an exit time, calculating an estimated dwell time of the respective person based on a difference in the entry time and the exit time, and generating an alert based on calculating an average dwell time of the persons entering the environment over the period of time based on each estimated dwell time.
Example implementations include a method, apparatus and computer-readable medium for tracking queue space events, comprising receiving a plurality of data frames from a camera capturing a view of an environment. The implementations further include identifying in the plurality of data frames at least one queue space of the environment, tracking a position of a first person in the plurality of data frames, and calculating a dwell time of the first person when detecting that the position of the first person is in the at least one queue space. Additionally, the implementations include generating a queue delay indication in response to determining that the dwell time exceeds a threshold dwell time, and generating an alert that an attribute of the at least one queue space needs to be modified in response to determining that more than a threshold amount of queue delay indications have been generated within a period of time.
Example implementations include a method, apparatus and computer-readable medium for computer vision detection of a fall event, comprising detecting a person in a first image captured at a first time. The implementations further include identifying a plurality of keypoints on the person in an image, wherein the plurality of keypoints, when connected, indicate a pose of the person. Additionally, the implementations further include detecting, using the plurality of keypoints, that the person has fallen in response to determining that, subsequent to the pose being the standing pose in a previous image, the keypoints of the plurality of keypoints associated with the shoulders of the person are higher than the keypoints of the second plurality of keypoints associated with the eyes and the ears of the person in the second image. Additionally, the implementations further include generating an alert indicating that the person has fallen.
Example implementations include a method, apparatus and computer-readable medium for generating a visual model of a uniform, comprising detecting a plurality of persons in one or more images. The implementations further include generating a sub-image depicting the respective person from the one or more images for each respective person of the plurality of persons. Additionally, the implementations further include identifying one or more articles of clothing worn by the respective person, executing at least one transformation that adjusts pixels of the sub-image such that the one or more articles of clothing depicted in the sub-image fit in a common template, calculating variance values between a plurality of transformed sub-images comprising the sub-image transformed by the at least one transformation and other sub-images generated for other persons in the plurality of persons and transformed by the at least one transformation, and generating a virtual model based on the variance values.
Aspects of the present disclosure include methods, systems, and non-transitory computer readable media for receiving a plurality of reception magnetic signals, determining state information associated with each marker of the plurality of markers based on a corresponding transmission magnetic signal of the plurality of transmission magnetic signals and a corresponding reception magnetic signal of the plurality of reception magnetic signals, and determining tag information based on the state information of the plurality of markers.
G08B 13/24 - Electrical actuation by interference with electromagnetic field distribution
G01D 5/14 - Mechanical means for transferring the output of a sensing member; Means for converting the output of a sensing member to another variable where the form or nature of the sensing member does not constrain the means for converting; Transducers not specially adapted for a specific variable using electric or magnetic means influencing the magnitude of a current or voltage
G06K 19/06 - Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
G08B 27/00 - Alarm systems in which the alarm condition is signalled from a central station to a plurality of substations
6.
AUTO-CONFIGURING A REGION OF INTEREST (ROI) ASSOCIATED WITH A CAMERA
Disclosed herein are apparatuses and methods for auto-configuring a region of interest (ROI) associated with a camera. In one implementation, A method includes tracking, over a plurality of image frames spanning a first period of time, a plurality of objects moving in an environment, and determining a plurality of respective trajectories of the plurality of objects. The method includes identifying a common trajectory shared by more than one object of the plurality of objects based on comparing each of the plurality of respective trajectories to one another and identifying an ROI that encompasses the common trajectory. The method further includes tracking, over a plurality of new image frames spanning a second period of time, another plurality of objects moving in the environment, and generating an alert that the common trajectory has changed based on new trajectories of the another plurality of objects.
The present disclosure relates to systems and methods for contactless checkout in a retail environment including a security pedestal located at an entrance or exit to a retail location. The system further includes a scanning device that is communicably coupled with the security pedestal. The self-checkout system and methods may also include a processing system that is configured to receive a list of items from the security pedestal and customer identification code from the scanning device. The system and method is configured to allow for a customer to scan his purchases at the security pedestal and pay for the purchases through the use of the customer identification code generated, preferably, using the customer's personal computing device.
A method for securing a security tag into an article of clothing includes positioning an end of the security tag into a first opening to an interface space between two layers of the article of clothing. The two layers are fixedly connected by one or more opposing connectors that are spaced apart in a manner to form the interface space sized to receive the security tag. The security tag is fully moved into the interface space. Also described herein is a security tag specially configured for placement into the interface space between two layers of the article of clothing.
Example aspects include techniques for reducing false alarms caused by stray tags. These techniques may include determining, by a processor of an EAS system, a chatter score of a RFID identification of a RFID tag that generated one or more RFID readings at one or more RFID readers, and selecting, by the processor of the EAS system, the RFID identification based at least in part on the chatter score being below a chatter score threshold. In addition, the techniques may include determining, by the processor of the EAS system, that the RFID identification corresponds to a RFID tag in motion, and triggering, by the processor of the EAS system, an alarm based on a determination that the RFID tag identified by the RFID identification is not authorized to leave a controlled area associated with the one or more RFID readers.
An electronic article surveillance (“EAS”) tag for an EAS system, comprising an antenna, a radio frequency identification (“RFID”) chip configured to transmit and/or receive a wireless signal via the antenna; and a magnetically-actuatable switch configured to move between a first position and a second position. The switch is configured to electrically couple the RFID chip to the antenna in the first position. The switch is further configured to electrically decouple the RFID chip from the antenna in the second position.
A flexible security tag includes: an elongated inlay portion; a loop antenna mounted on the elongated inlay portion; an electrically-conductive member longitudinally extending across the elongated inlay portion, spaced apart from and inductively coupled to the loop antenna; and a radio frequency identifier (RFID) circuit mounted to the loop antenna. The flexible security tag is encapsulated within an elongated textile protective sleeve.
A method for configuring a sensor tag may include providing a flexible substrate layer comprising a thin film of thermoplastic polyurethane (TPU); depositing a sensor inlay on the flexible substrate layer; and applying a protective coating over the sensor inlay encapsulating the sensor inlay between the flexible substrate layer and the protective coating.
G06K 19/02 - Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the selection of materials, e.g. to avoid wear during transport through the machine
H01Q 1/22 - Supports; Mounting means by structural association with other equipment or articles
G06K 19/077 - Constructional details, e.g. mounting of circuits in the carrier
An electronic article surveillance tag with a tag body, a locking member, and unlocking member. The locking member is within the tag body and can receive and releasably engage with a pin portion of a connecting member and lock the connecting member to the tag body. The locking member includes a clutch mechanism movable between a first position in fixed engagement with the pin portion and corresponding to a locked state and a second position corresponding to an unlocked state that allows detachment of the pin portion from the locking member. The clutch mechanism further includes a plunger member formed from a non-ferromagnetic material. The unlocking member is fully encased within the tag body and movement of the unlocking member from a locked position to an unlocked position moves the clutch mechanism between the first position corresponding to the locked state and the second position corresponding to the unlocked state.
An antenna for providing light is disclosed. The antenna may comprise a substrate having at least two domains and a light source which is connected to two domains. The light source may emit light when a direct current flows from one domain to another domain. A radio frequency (RF) current flows through the domains for generation of radio waves. A capacitor is provided between adjacent domains to provide a path for the RF current to bypass the light source. The substrate is enabled to absorb the heat dissipated by the light source. The substrate is coated with a reflective material to reflect impinging light rays.
The present aspects include a magnetic detacher including a housing having a wall that defines a nest configured to receive a security tag; a gate member and an actuator configured to move the gate member between a closed position and an open position, wherein the gate member in the closed position blocks the nest, and in the open position allows access to the nest; a magnet positioned on an opposite side of the housing relative to the nest and adjacent to the nest, the magnet having a field in an area of the nest sufficient to unlock a magnetic lock of the security tag; and a processor in communication with the actuator and with a transaction system, wherein the processor is configured to control the actuator to move the gate member from the closed position to the open position based on receipt of an unlock signal from the transaction system.
The present aspects include a method of detaching a security tag from an article, including receiving, at a detacher device, an unlock signal from a transaction system. The detacher device includes a housing having a nest configured to receive a security tag, a gate assembly including a gate member movable between a closed position that blocks the nest and an open position, and a magnet positioned on an opposite the nest and having a magnetic flux sufficient to unlock a magnetic lock of the security tag. The method further includes moving the gate member from the closed position to the open position based on receipt of the unlock signal, receiving the security tag in the nest, and unlocking the magnetic lock of the security tag to allow the security tag to be detached from the article.
E05B 73/00 - Devices for locking portable objects against unauthorised removal; Locking devices not provided for in other groups of this subclass
G08B 13/19 - Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using infrared-radiation detection systems
Example implementations include a system and method for providing a graphical user interface (GUI) on a display, wherein the GUI is operable for displaying a representation of a detection field of an object counting radar unit, wherein the GUI is operable for displaying a reference point that represents a rotatable object as detected by the object counting radar unit when the rotatable object is located in a field-of-view of the object counting radar unit and is rotated by a drive motor assembly.
A method for operating a sensor includes receiving identification information from one or more electronic identification devices (EIDs) located in a vicinity of the sensor. A number of EIDs located in the vicinity of the sensor is determined based on the received identification information. A determination is made if the number of EIDs located in the vicinity of the sensor exceeds a first predefined threshold. Transmission power to the sensor is selectively adjusted based on the number of EIDs with respect to the first predefined threshold, in response to determining that the number of EIDs located in the vicinity of the sensor exceeds or is less than any number of predefined thresholds.
Systems and methods for coupling a tag to an item. The methods comprise: dispensing the tag from a tag feeder of a tag applicator; performing first operations by the tag applicator to mechanically move the tag into a nest of the tag applicator; determining if a given criteria is met based on feedback information received from at least one of a user of the tag applicator and a sensor provided with the tag applicator; and performing second operations by the tag applicator to couple the tag to the item, when a determination is made that the given criteria is met.
G06Q 10/087 - Inventory or stock management, e.g. order filling, procurement or balancing against orders
G08B 13/24 - Electrical actuation by interference with electromagnetic field distribution
E05B 73/00 - Devices for locking portable objects against unauthorised removal; Locking devices not provided for in other groups of this subclass
F16B 21/00 - Means without screw-thread for preventing relative axial movement of a pin, spigot, shaft, or the like and a member surrounding it; Stud-and-socket releasable fastenings without screw-thread
22.
SYSTEM AND METHOD FOR FOIL DETECTION USING MILLIMETER WAVE FOR RETAIL APPLICATIONS
In an aspect, the present disclosure includes a system for detecting metal foil using millimeter wave (mmWave) for retail applications. The system comprises one or more pedestals positioned to define an exit portal leading to a point of exit, one or more security tag readers, fixedly positioned with the one or more pedestals, configured to read data from a security tag passing through the exit portal and one or more mmWave receivers, fixedly positioned near the point of exit, configured to receive one or more reflected mmWave beams from metal foil, wherein the detection of metal foil results in an alert message.
Systems and methods for operating a marker that involve receiving, by a Radio Frequency Identification (“RFID”) element of the marker, an RFID deactivation signal; and responsive to the RFID deactivation signal, supplying power to a detuner element of the marker so that the detuner element switches from a first state to a second state. The marker's resonant frequency is changed to a first value that falls outside of an Electronic Article Surveillance (“EAS”) systems operating frequency range when the detuner element switches from the first state to the second state.
An EAS system first transmits a radio frequency identification (RFID) interrogation signal into an RFID interrogation zone of an EAS system. The system then first receives at least one RFID response signal from a first RFID tag of the system responding to the interrogation signal. The system second transmits a non-RFID RF signal into a second zone. The second zone and the RFID interrogation zone overlap to form a zone of interest. The system second receives, from the first RFID tag, an indication that the first RFID tag received the second transmission. The system determines, based on receiving both the RFID response signal from a first RFID tag and the indication that the first RFID tag received the second transmission, that the first RFID tag is in the zone of interest.
H04W 4/80 - Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
G06K 19/07 - Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards with integrated circuit chips
26.
VISION SYSTEM FOR CLASSIFYING PERSONS BASED ON VISUAL APPEARANCE AND DWELL LOCATIONS
Example implementations include a method, apparatus and computer-readable medium of computer vision configured for person classification, comprising receiving, during a first period of time, a plurality of image frames of an environment, identifying images of persons from each frame of the plurality of image frames, and determining a respective vector representation of each of the images. The implementations include generating a probability distribution indicative of a likelihood of a particular vector representation appearing in the plurality of image frames and identifying an associate vector representation by sampling the probability distribution using a probability model. The implementations include determining an input vector representation of an input image identified in an image frame depicting a person and received during a second period of time. The implementations include comparing the input vector representation with the associate vector representation and classifying, based on the comparison, the person in the input image as an associate.
G06V 20/52 - Surveillance or monitoring of activities, e.g. for recognising suspicious objects
G06V 40/10 - Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
G06V 10/764 - Arrangements for image or video recognition or understanding using pattern recognition or machine learning using classification, e.g. of video objects
H04N 7/18 - Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
G06V 40/20 - Movements or behaviour, e.g. gesture recognition
Techniques for distinguishing objects (e.g., an individual or an individual pushing a shopping cart) are disclosed. An object is detected in images of a scene. A height map is generated from the images, and the object is represented as height values in the height map. Based on height properties associated with another object, it is determined whether the other object is associated with the object. If so determined, the objects are classified separately.
An RFID portal of an EAS system first interrogates a first zone extending into a controlled area beyond a threshold distance from an interrogating antenna of the portal. The portal defines an exit from the controlled area, the threshold distance being less than a width of the exit. The portal first detects, in response to the first interrogating, a first response of a particular RFID tag. The portal second interrogate, subsequent to the first detecting, in a second zone extending into the controlled area at least to the threshold distance. The portal second detects, in response to the second interrogating, at least one second response of the particular RFID tag indicating a received signal strength of the second interrogating at the particular RFID tag corresponding to a distance from an interrogating antenna of the portal less than the threshold distance. The EAS system alarms in response to the second detecting.
Aspects of the present disclosure relate to methods and systems for laser turning and attaching RFID tags to products. Such methods and systems may include a memory and a processor coupled to the memory. The methods and systems may include determining a characteristic of a conductive trace on a substrate to be incorporated into an item to configure a tag performance in view of at least one of a dielectric property or a tuning property of the item. The methods and systems may further include a laser to alter the conductive trace on the substrate to have the characteristic to define an antenna for the tag. The methods and systems may further include an attaching device configured to attach a communications enabled device to the substrate so as to form an electrical connection between the communications enabled device and the antenna to form the tag.
G06K 19/07 - Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards with integrated circuit chips
G06K 19/077 - Constructional details, e.g. mounting of circuits in the carrier
Systems and methods for operating a security tag. The methods comprise: causing a plunger of the security tag to engage a latch of the security tag; preventing, by an anti-defeat structure of the security tag, a disengagement between the plunger and the latch when an impact force is applied to the security tag; and allowing, by the anti-defeat structure, the plunger to disengage the latch when a magnetic field is applied to the security tag.
Aspects of the present disclosure relate generally to a vision system that detects persons exiting an environment, comprising detecting, by a processor using a plurality of image frames from at least one sensor, persons that exited the environment during a first period of time. The vision system further determines, by the processor, an exit count for the first period of time and retrieves, from a database, historical egress data comprising a detected historic exit count and a corrected historic exit count of the environment for a second period of time corresponding to the first period of time. The vision system calculates an error rate for the second period of time based on a ratio of the detected historic exit count and the corrected historic exit count, determines and stores a corrected exit count for the first period of time by adjusting the exit count using the error rate.
A method for securing a security tag into an article of clothing includes positioning an end of the security tag into a first opening to an interface space between two layers of the article of clothing. The two layers are fixedly connected by one or more opposing connectors that are spaced apart in a manner to form the interface space sized to receive the security tag. The security tag is fully moved into the interface space. Also described herein is a security tag specially configured for placement into the interface space between two layers of the article of clothing.
An electrical switch with a conductive bridge, a first wire configured to provide continuity with the conductive bridge, and a biasing member connected to the first wire. The biasing member provides a threshold reaction force to maintain continuity between the first wire and the conductive bridge. The switch further includes a housing that directs tensile forces acting upon the first wire to oppose a reaction force of the biasing member. When a tensile force acting on the first wire exceeds a threshold reaction force of the biasing member continuity between the first wire and the conductive bridge is broken.
G08B 13/24 - Electrical actuation by interference with electromagnetic field distribution
G08B 7/06 - Signalling systems according to more than one of groups ; Personal calling systems according to more than one of groups using electric transmission
G08B 13/14 - Mechanical actuation by lifting or attempted removal of hand-portable articles
Example implementations include a method, apparatus and computer-readable medium for person detection by a computer device, comprising receiving a plurality of video frames from a camera located in an environment, wherein the video frames include a depiction of a person in the environment. The implementations further include identifying attributes of the person from the video frames and comparing the attributes with attribute entries in a database of suspicious persons, wherein the database of suspicious persons includes attributes of a plurality of persons associated with an alert in the environment. The implementations include retrieving a profile indicative of an alert history of the suspicious person in response to determining a match between the attributes of the person and an entry in the database corresponding to a suspicious person, and transmitting, to a second computer device, the retrieved profile and a notification that indicates that the suspicious person is in the environment.
G06V 40/10 - Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
G06V 20/52 - Surveillance or monitoring of activities, e.g. for recognising suspicious objects
G06V 40/16 - Human faces, e.g. facial parts, sketches or expressions
G06V 40/20 - Movements or behaviour, e.g. gesture recognition
H04N 5/232 - Devices for controlling television cameras, e.g. remote control
G06V 40/50 - Maintenance of biometric data or enrolment thereof
G06V 10/74 - Image or video pattern matching; Proximity measures in feature spaces
H04N 7/18 - Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
G08B 13/196 - Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
G08B 31/00 - Predictive alarm systems characterised by extrapolation or other computation using updated historic data
The present disclosure relates generally to security tags, and more specifically relates to electronic article surveillance (EAS) tags. The tag prevents unauthorized removal of an article as well as triggers an alarm when the tag is attempted for tampering. The tag comprises a housing, a switch, and a processing circuit. The switch includes a first contact coupled with the housing and a second contact coupled with an article. The second contact is movable relative to the first contact. The processing circuit is provided to detect electrical disconnection between the first contact and the second contact, and trigger an alarm upon detecting the electrical disconnection.
G08B 13/24 - Electrical actuation by interference with electromagnetic field distribution
G08B 7/06 - Signalling systems according to more than one of groups ; Personal calling systems according to more than one of groups using electric transmission
Aspects of the present disclosure include methods, systems, and non-transitory computer readable media for receiving an initial image of the area, receiving an updated image of the area, detecting at least one of a person in the area or a movement in the area based on the updated image, comparing the updated image and the initial image to identify a change in the area, and determining a presence or an absence of the occlusion based on the change in the area and the at least one of the person or the movement in the area.
Apparatus and methods for processing video surveillance data includes training a data repository, using a first plurality of surveillance video files including a first plurality of video frames, to identify macroblocks of the video frames representing average content of the first plurality of surveillance video files. An ordered data structure is generated by sorting the plurality of macroblocks of video frames based on image differences within the plurality of macroblocks. The ordered data structure includes a root node. A second plurality of surveillance video files including a second plurality of video frames is received. The second plurality of video frames is inserted into the generated ordered data structure. References to the generated ordered data structure are stored in the data store for each frame of the second plurality of video frames along with a difference between corresponding video frames and references.
H04N 19/426 - Methods or arrangements for coding, decoding, compressing or decompressing digital video signals - characterised by implementation details or hardware specially adapted for video compression or decompression, e.g. dedicated software implementation characterised by memory arrangements using memory downsizing methods
H04N 19/91 - Entropy coding, e.g. variable length coding [VLC] or arithmetic coding
H04N 19/136 - Incoming video signal characteristics or properties
H04N 19/176 - Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using adaptive coding characterised by the coding unit, i.e. the structural portion or semantic portion of the video signal being the object or the subject of the adaptive coding the unit being an image region, e.g. an object the region being a block, e.g. a macroblock
Apparatus and methods for self-checkout at a retail establishment includes receiving, by a sensor gate and from a payment processing device, purchase transaction information related to a purchase by a customer. The sensor gate scans customized label attached to each article possessed by the customer located in a surveillance zone of the retail establishment. The sensor gate compares information contained in the customized label with the received purchase transaction information.
G06K 7/10 - Methods or arrangements for sensing record carriers by corpuscular radiation
G06K 19/07 - Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards with integrated circuit chips
G07C 9/29 - Individual registration on entry or exit involving the use of a pass the pass containing active electronic elements, e.g. smartcards
Systems and methods for operating a security system. The methods comprise: monitoring an area for a presence of an individual or vehicle using wireless signals of a first type that are received by a first radio of the security system; operating the first radio as a wireless sensor for generating sensor data; determining whether the individual or vehicle is exhibiting an unusual behavior using the sensor data and pre-programmed or machine learned patterns of unusual behavior; changing an operating frequency of the first radio when a determination is made that the individual or vehicle is exhibiting unusual behavior; and communicating a wireless signal of a second type from the first radio when the individual or vehicle is exhibiting unusual behavior, where the second type is different than the first type.
G08B 13/181 - Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using active radiation detection systems
Disclosed herein are apparatuses and methods for detecting a slip, trip or fall event in an environment and sending an alert of the event. An implementation may comprise detecting, in image frames captured by a camera, when an object enters a region of interest, tracking movements of the object, and determining that the object is in a fall-zone. The fall-zone may be specified by a set of line segments, each line segment being defined by points that lie in the region of interest. The implementation may further comprise, when the object is in the fall-zone, recording the position of the object, detecting a slip, trip or fall event when the object transitions from a first position above a predetermined height threshold to a second position below the predetermined height threshold, a pose of the object indicates that the object is lying down, or the object transitions from a vertical to horizontal pose, and sending the alert.
Disclosed herein are apparatuses and methods for auto-configuring a region of interest (ROI) associated with a camera. In one implementation, a method comprises receiving image frames from a camera installed in the environment, wherein the ROI is located within the view of the image frames. The method includes tracking a plurality of persons in the image frames and determining a respective trajectory of movement for each person of the plurality of persons. The method further includes comparing each of the respective trajectories to one another and identifying, based on the comparing, a common trajectory shared by more than one person of the plurality of persons, wherein the common trajectory is not fully encompassed in the ROI. The method additionally includes updating the ROI to encompass the common trajectory, and includes configuring the updated ROI to be associated with new image frames from the camera.
Example aspects include methods, apparatuses, and computer-readable medium for receiving, by an antenna of a tag tracking/detection system, a tag signal of a tag in the tag tracking/detection system; determining, based on a strength or pattern of the tag signal, whether the tag signal comprises a reflected signal that is reflected by one or more reflective surfaces, wherein the one or more reflective surfaces are configured to focus tag signals of tags in a target location of the tag tracking/detection system toward the antenna of the tag tracking/detection system; and generating an output signal responsive to the tag signal comprising the reflected signal that is reflected by the one or more reflective surfaces, wherein the output signal is indicative of the tag being detected in the target location.
A system may be configured to perform enhanced detection of occluded objects in a multiple object detection system. In some aspects, the system may detect a plurality of current objects in a current video frame, generate initial object identifier mapping information assigning a candidate object identifier to a first object of the plurality of current objects, and detect a multi-object tracking (MOT) inaccuracy condition. Further, the system may generate a current fingerprint corresponding to the first object of the plurality of current objects, identify an assignment error based on comparing the current fingerprint to historic fingerprints associated with a plurality of historic objects detected in a previous frame, generate updated object identifier mapping information based on the assignment error, and display the current video frame based on the updated object identifier mapping information.
G06K 9/00 - Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
G06V 20/40 - Scenes; Scene-specific elements in video content
G06T 7/246 - Analysis of motion using feature-based methods, e.g. the tracking of corners or segments
G06V 20/58 - Recognition of moving objects or obstacles, e.g. vehicles or pedestrians; Recognition of traffic objects, e.g. traffic signs, traffic lights or roads
G06V 40/16 - Human faces, e.g. facial parts, sketches or expressions
G06T 5/40 - Image enhancement or restoration by the use of histogram techniques
52.
Dynamic artificial intelligence camera model update
A system may be configured to dynamically update deployed machine learning models. In some aspects, the system may receive sampled video information, generate first object detection information based on a cloud model and the sampled video information, and generate second object detection information based on a first edge model and the sampled video information. Further, the system may select, based on the first object detection information and the second object detection information, a plurality of training images from the sampled video information, detect motion information corresponding to motion of one or more detected objects within the plurality of training images, generate a plurality of annotated images based at least in part on the first object detection information and the motion information, and generate a second edge model based upon training the first edge model using the plurality of annotated images.
Systems and methods for operating an Electronic Smart Tag (“EST”). The methods involve: operating the EST in a first operational state in which first item related information is output from an electronic output device of the EST that is powered by an energy storage device storing energy harvested from an external energy source; detecting when a charge level of the energy storage device reaches or falls below a first threshold level; and transitioning an operational state of the EST from the first operational state to a second operation state in which a message is output from EST requesting that a mobile device be placed in proximity to the EST for purposes of obtaining at least a first portion of the first item related information, in response to the detection that the charge level of the energy storage device has reached or fallen below the first threshold level.
G06K 19/07 - Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards with integrated circuit chips
G06K 7/10 - Methods or arrangements for sensing record carriers by corpuscular radiation
A radio frequency identification (RFID) system first interrogates, in a first mode, one or more particular target zones of the plurality of target zones including a given target zone. Each particular target zone is interrogated with one of the antennas at a time at a first power for the particular target zone. The RFID system monitors, upon first interrogating, for a trigger condition to occur. In response to the trigger condition not occurring, the RFID system continues the first interrogation in the first mode. In response to the trigger condition occurring, the RFID system second interrogates the given target zone in a second mode at a second power with a plurality of the antennas. The second power for the given target zone is greater in an aggregate across the second interrogating antennas than the first power for the given target zone.
G06K 7/00 - Methods or arrangements for sensing record carriers
G06K 7/10 - Methods or arrangements for sensing record carriers by corpuscular radiation
G06K 19/07 - Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards with integrated circuit chips
Systems and methods for dynamically changing displayed content of a tag coupled to an item. The methods comprising: detecting when an individual is in proximity to the tag; triggering operations, by a computing device remote from the tag, to obtain customer related information associated with the individual, when a detection is made that the individual is in proximity to the tag; determining, by the computing device, a price discount for the item based on the customer related information which was previously obtained; and dynamically changing the displayed content of the tag to include the price discount while the individual is still in proximity to the tag.
G06Q 30/02 - Marketing; Price estimation or determination; Fundraising
G08B 13/24 - Electrical actuation by interference with electromagnetic field distribution
G06K 19/07 - Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards with integrated circuit chips
58.
LAYOUT MAPPING BASED ON PATHS TAKEN IN AN ENVIRONMENT
Disclosed herein are apparatuses and methods for iteratively mapping a layout of an environment. The implementations include receiving a visual stream from a camera installed in the environment, wherein the visual stream depicts a view of the environment, and wherein positional parameters of the camera and dimensions of the environment are set to arbitrary values. The implementations include monitoring a plurality of persons in the visual stream. For each person in the plurality of persons, the implementations further includes identifying a respective path that the person moves along in the view, updating the dimensions of the environment captured in the view, based on an estimated height of the person and movement speed along the respective path, and updating the positional parameters of the camera based on the updated dimensions of the environment. The implementations further includes mapping a layout of the environment captured in the view of the camera.
Aspects of the present disclosure provide techniques that utilize artificial intelligence (AI) to preemptively identify and prioritize risks for retailers from shrink loss. Specifically, features of the present disclosure provide actionable prescriptions to prevent shrink based on the output of a hybrid machine learning (ML) system that accurately identifies shrink risk factors and implements a cost-effective shrinkage control plan to reduce the retail theft. The shrinkage control plan may then be displayed to the user on a display device (or user interface) in order to allow for the user (e.g., store manager) to implement the recommendations developed by the recommendation engine.
Aspects of the present disclosure provide techniques to implement artificial intelligence (AI) that preemptively identifies and prioritizes risks for retailers for shrink loss. Specifically, features of the present disclosure provide a hybrid machine learning (ML) techniques that selects two or more machine learning algorithms to develop a machine learning model to accurately identify shrink risk factors and implement a cost-effective shrinkage control plan to control the retail theft.
Aspects of the present disclosure include receiving one or more RFID interrogating signals from the RFID scanner, generating one or more internal signals, mixing the one or more RFID interrogating signals with the one or more internal signals to generate one or more resultant signals, and backscattering the one or more resultant signals.
G06K 7/00 - Methods or arrangements for sensing record carriers
G06K 7/10 - Methods or arrangements for sensing record carriers by corpuscular radiation
G06K 19/07 - Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards with integrated circuit chips
62.
Methods and apparatuses for reducing false positive alarms
Aspects of the present disclosure include methods, systems, and non-transitory computer readable media for identifying a first sector proximal to a reader and a second sector proximal to the reader, receiving one or more parameters associated with at least one of a minimum sector count setting, an opposite sector threshold setting, or a suppression threshold setting, applying, to the reader, the one or more parameters associated with the at least one of the minimum sector count setting, the opposite sector threshold setting, or the suppression threshold setting, and detecting a tag based on the one or more parameters.
An electronic article surveillance tag including a tag body member and a connecting member having a pin portion releasably engageable with the tag body member, wherein the pin portion extends along a first axis. The tag further includes a locking member having a clutch mechanism including a plunger member formed from a non-ferromagnetic material and an unlocking member connected to the clutch mechanism. The unlocking member is moveable along a second axis perpendicular to the first axis between a locked position and an unlocked position, wherein during movement between the locked position and the unlocked position, the unlocking member moves the clutch mechanism between the first position corresponding to the locked state and the second position corresponding to the unlocked state.
A system may be configured to perform object counting in high volume traffic. In some aspects, the system may determine object detection information defining an absence of an object within the region of interest in a current video frame, and determine that a location associated with the object is within a placeholder-eligible area within the region of interest based on first tracker information determined in a previous video frame. Further, the system may determine second tracker information including a bounding representation for the object based at least in part on the location and object detection information, and determine, based on the second tracker information, an object count representing a number of the objects that have entered the region of interest and/or a number of the objects that have exited the region of interest.
A system may be configured to perform object counting in high volume traffic. In some aspects, the system may detect a candidate object within the region of interest in a current video frame, and determine that the candidate object is a detected object based at least in part on comparing an attribute value of the candidate object to historic attribute information determined during a plurality of previous video frames. Further, the system may determine track information based on the detected object and determine an object count representing a number of the objects that have entered the region of interest and/or a number of the objects that have exited the region of interest.
A method for configuring a sensor tag includes placing the sensor tag in a location on a garment or fabric to be affixed. The method may further include applying a heat source at a temperature to the sensor tag for a time period. The method may further include removing the heat source after the time period has elapsed. The method may further include removing a paper layer between an adhesive layer and the garment of fabric prior to placing the sensor taking in the location. The method may further include removing a top protective layer after removing the heat source.
G06K 19/077 - Constructional details, e.g. mounting of circuits in the carrier
G08B 13/24 - Electrical actuation by interference with electromagnetic field distribution
G06K 19/02 - Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the selection of materials, e.g. to avoid wear during transport through the machine
Example implementations include a method, apparatus, and computer-readable medium for electronic article surveillance (EAS), comprising transmitting an acousto-magnetic (AM) interrogation signal into an AM interrogation zone of an EAS system. The AM interrogation zone and a wireless communication zone overlapping to form a zone of interest. The wireless communication zone employing a wireless communication technology other than AM. Indicating, by the EAS system, a presence of a first tag of the EAS system in the zone of interest upon a concurrent detection of both i) a response signal of the first tag via the wireless communication technology and ii) an AM response signal of the first tag in response to the AM interrogation signal.
Electronic Article Surveillance in which a radio frequency identification (RFID) interrogation signal is transmitted, over a first window of time, into an RFID interrogation zone of the EAS system. A plurality of response signals are detected from a first RFID tag of the EAS system responding to the interrogation signal. Over a second window of time overlapping at least in part with the first window of time, image data is captured within a field of view. The field of view and the RFID interrogation zone overlap to form a zone of interest. Movement of a non-tag object is characterized during the first window of time based on the image data. Whether the first RFID tag is associated with the characterized non-tag object is determined based on a comparison of the detected plurality of response signals and the characterized movement of the non-tag object.
G08B 13/24 - Electrical actuation by interference with electromagnetic field distribution
H04W 4/80 - Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
Transmitting a radio frequency identification (RFID) interrogation signal into an RFID interrogation zone of an Electronic Article Surveillance (EAS) system. Detecting at least one response signal from a first RFID tag of the EAS system responding to the interrogation signal. Capturing, at one or more times in a window of time around the detection, sensor data within a sensor field, the sensor field and the RFID interrogation zone overlapping to form a zone of interest. Characterizing movement of a non-tag object during the window of time based on the captured sensor data. Determining whether the first RFID tag is associated with the characterized non-tag object based on a comparison of the at least one response signal and the characterized movement of the non-tag object.
An electronic article surveillance (“EAS”) tag for an EAS system, comprising an antenna, a radio frequency identification (“RFID”) chip configured to transmit and/or receive a wireless signal via the antenna; and a magnetically-actuatable switch configured to move between a first position and a second position. The switch is configured to electrically couple the RFID chip to the antenna in the first position. The switch is further configured to electrically decouple the RFID chip from the antenna in the second position.
Example aspects include a method, apparatus and computer-readable medium of determining losses at a point of sale (POS) device, comprising receiving, by a processor from an imaging device, a video feed of a scanning area. The aspects further include detecting, by the processor, an entry of an item into the scanning area. Additionally, the aspects further include identifying, by the processor, one or more motion parameters of the item. Additionally, the aspects further include determining, by the processor, a dwell-time for the item based at least on the one or more motion parameters. Additionally, the aspects further include identifying, by the processor, a scan time anomaly for the item. Additionally, the aspects further include outputting a notification, by the processor, indicating a suspicious activity for the item, wherein the notification indicating the suspicious activity is based on the scan time anomaly.
G08B 13/196 - Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
74.
Methods and apparatuses for determining frequency response of a security tag
Aspects of the present disclosure include methods, systems, and non-transitory computer readable media for transmitting at least one incident radio frequency identification (RFID) signal to a RFID tag attached to a merchandize item, receiving at least one reflected RFID signal from the RFID tag, determining a frequency response of the RFID tag based on the at least one reflected RFID signal, comparing the frequency response to a plurality of baseline frequency responses, and determining a state of the RFID tag based on the comparing.
Systems and methods for providing a tag. The tag comprising a flexible elongate structure comprising a cord or a cable; an electronic thread device integrated into the cord or cable that is operative to wirelessly communicate with external devices for inventory management or security purposes; and/or an Electronic Article Surveillance (“EAS”) component integrated into the cord or cable.
Systems and methods for integrating tags with items. The methods comprise: dynamically determining a length of each metal thread to be incorporated into or trace to be disposed on a item to optimize tag performance in view of dielectric and tuning properties of the item. In the metal thread scenarios, the methods also involve: creating a metal thread having the length that was dynamically determined; and sewing the metal thread into the item being produced to form an antenna for a first tag. In the trace scenarios, the methods also involve forming the trace on the item being produced to form an antenna for a first tag. Next, at least a communications enabled device is attached to the item so as to form an electrical coupling or connection between the communications enabled device and the at least one antenna.
G06K 19/07 - Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards with integrated circuit chips
G06K 7/00 - Methods or arrangements for sensing record carriers
G06K 19/077 - Constructional details, e.g. mounting of circuits in the carrier
An apparatus and method for unlocking a security tag that is connected to an article. The apparatus includes an unlocking device configured to provide an unlock signal or force to a security tag allowing for the security tag to be removed from the article. The apparatus further includes an outer housing having an unlocking surface at least partially disposed above the unlocking device, wherein the unlocking surface includes a continuous surface area defined by a first surface area connected to a second surface area. In one aspect, the second surface area is tactily distinct from the first surface area and the second surface area includes an alignment feature configured to indicate a detachment zone that corresponds with a source of the unlock signal or force.
A security tag assembly for placing around a boot, including a circuit board having a processor, and one or more wires electrically connected to the circuit board that form a first opening and a second opening. The first and second openings are respectively configured to receive first and second components of the boot. The assembly further includes a tension switch connected to the one or more wires and having a closed position corresponding to a first tension level on the one or more wires and an open position corresponding to a second tension level on the one or more wires, wherein the second tension level is greater than the first tension level. Further, the processor is configured to monitor whether the tension switch is in at least the open position, wherein the processor is configured to trigger an alarm in response to the switch being in the open position.
G08B 13/24 - Electrical actuation by interference with electromagnetic field distribution
G08B 13/14 - Mechanical actuation by lifting or attempted removal of hand-portable articles
G08B 7/06 - Signalling systems according to more than one of groups ; Personal calling systems according to more than one of groups using electric transmission
Disclosed herein are apparatuses and methods for iteratively mapping a layout of an environment. The implementations include receiving a visual stream from a camera installed in the environment, wherein the visual stream depicts a view of the environment, and wherein positional parameters of the camera and dimensions of the environment are set to arbitrary values. The implementations include monitoring a plurality of persons in the visual stream. For each person in the plurality of persons, the implementations further includes identifying a respective path that the person moves along in the view, updating the dimensions of the environment captured in the view, based on an estimated height of the person and movement speed along the respective path, and updating the positional parameters of the camera based on the updated dimensions of the environment. The implementations further includes mapping a layout of the environment captured in the view of the camera.
Disclosed herein are apparatuses and methods for auto-configuring a region of interest (ROI) associated with a camera. In one implementation, a method comprises receiving image frames from a camera installed in the environment, wherein the ROI is located within the view of the image frames. The method includes tracking a plurality of persons in the image frames and determining a respective trajectory of movement for each person of the plurality of persons. The method further includes comparing each of the respective trajectories to one another and identifying, based on the comparing, a common trajectory shared by more than one person of the plurality of persons, wherein the common trajectory is not fully encompassed in the ROI. The method additionally includes updating the ROI to encompass the common trajectory, and includes configuring the updated ROI to be associated with new image frames from the camera.
A system may be configured to implement a probability network for loss prevention sensors. In some aspects, the system may determine a location transition of a tag associated with an article, determine a first predictive value based at least in part on a first predictive structure and the location transition, the first predictive structure corresponding to a valid detection alarm, and determine a second predictive value based at least in part on a second predictive structure and the location transition, the second predictive structure corresponding to an invalid detection alarm. Further, the system may generate a notification based at least in on part on comparing the first predictive value to the second predictive value, the notification indicating unauthorized movement of the tag outside of a geographic area.
A system may be configured to perform enhanced detection of occluded objects in a multiple object detection system. In some aspects, the system may determine a first size of a queue captured in a video frame based on an object detection system and a video capture device, and determine a second size of the queue based on the first size of the queue and a correction model. Further, the system may detect a person at a front of the queue based on an object tracking system, determine a first period of time spent by the person at the front of the queue based on an object tracking system, and estimate a second period of time spent in the queue based at least in part on the first period of time and the second size of the queue.
G06F 3/0481 - Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
A system may be configured to perform real-time shopper influence using edge device machine learning models. In some aspects, the system may determine shopper attribute information based on one or more video frames captured by the first edge device and a first inference model of the first edge device, determine article attribute information based on one or more video frames captured by the second edge device and a second inference model of the second edge device, and identifying contextual information related to a state of the retail environment and/or historical information associated with a customer within the retail environment. Further, the system may determine, via a third inference model, real-time shopper engagement information based on the shopper attribute information, the article attribute information, and the contextual information, and transmit the real-time shopper engagement information to an employee device.
Aspects of the present disclosure include methods, systems, and non-transitory computer readable media for transmitting at least one incident radar signal, receiving at least one reflected radar signal in response to the at least one incident radar signal reflected from a person associated with the RFID tag, determining a first movement vector of the person based on the reflected radar signal, transmitting at least one incident RFID signal, receiving at least one backscattered RFID signal from the RFID tag, determining a second movement vector of the RFID tag based on at least one phase measurement of the at least one backscattered RFID signal, and determining whether the RFID tag is associated with the person based on the first movement vector and the second movement vector.
The present disclosure relates to security tags for an electronic article surveillance system deployed in a retail environment. The security tag is a single piece security tag that comprises a tack housing and a tag housing connected by a beam. The beam is enabled to house one or more antenna elements that is electrically connected with one or more electronic components housed within the tag housing. Alternatively, one or more antenna elements can be housed within the tack housing, wherein engagement of the tack housing with the tag housing enables the one or more antenna elements to receive electrical signals from the one or more electronic components via a tack.
The present disclosure relates to systems and methods for contactless checkout in a retail environment including a security pedestal located at an entrance or exit to a retail location. The system further includes a scanning device that is communicably coupled with the security pedestal. The self-checkout system and methods may also include a processing system that is configured to receive a list of items from the security pedestal and customer identification code from the scanning device. The system and method is configured to allow for a customer to scan his purchases at the security pedestal and pay for the purchases through the use of the customer identification code generated, preferably, using the customer's personal computing device.
A system may be configured to perform enhanced detection of occluded objects in a multiple object detection system. In some aspects, the system may detect a plurality of current objects in a current video frame, generate initial object identifier mapping information assigning a candidate object identifier to a first object of the plurality of current objects, and detect a multi-object tracking (MOT) inaccuracy condition. Further, the system may generate a current fingerprint corresponding to the first object of the plurality of current objects, identify an assignment error based on comparing the current fingerprint to historic fingerprints associated with a plurality of historic objects detected in a previous frame, generate updated object identifier mapping information based on the assignment error, and displaying the current video frame based on the updated object identifier mapping information.
A system may be configured to accurately track shelf activity in real-time with support for dynamic shelf size, configuration, and item containment. In some aspects, the system may parse regions of a video frame to determine a region of interest representation corresponding to a physical location (e.g., a shelf compartment), determine an enhanced region of interest representation based at least in part on the region of interest representation and an image enhancement pipeline, determine edge information of one or more objects based on the enhanced region of interest representation, compare a reference representation of the physical location to the edge information, and determine the amount of available space for the physical location based on the comparing.
A system may be configured to perform enhanced detection of occluded objects in a multiple object detection system. In some aspects, the system may detect a plurality of current objects in a current video frame, generate initial object identifier mapping information assigning a candidate object identifier to a first object of the plurality of current objects, and detect a multi-object tracking (MOT) inaccuracy condition. Further, the system may generate a current fingerprint corresponding to the first object of the plurality of current objects, identify an assignment error based on comparing the current fingerprint to historic fingerprints associated with a plurality of historic objects detected in a previous frame, generate updated object identifier mapping information based on the assignment error, and display the current video frame based on the updated object identifier mapping information.
G06K 9/00 - Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
G06V 20/40 - Scenes; Scene-specific elements in video content
G06T 7/246 - Analysis of motion using feature-based methods, e.g. the tracking of corners or segments
G06V 20/58 - Recognition of moving objects or obstacles, e.g. vehicles or pedestrians; Recognition of traffic objects, e.g. traffic signs, traffic lights or roads
G06V 40/16 - Human faces, e.g. facial parts, sketches or expressions
G06T 5/40 - Image enhancement or restoration by the use of histogram techniques
91.
METHOD AND SYSTEM TO PROVIDE REAL TIME INTERIOR ANALYTICS USING MACHINE LEARNING AND COMPUTER VISION
A system may be configured to generate real-time analytics using machine learning and computer vision. In some aspects, the system may receive a storage structure video frame and an interaction video frame, determine a storage structure inference based on the storage structure video frame, and determine an interaction inference based on the interaction video frame. Further, the system may determine that the storage structure inference and the interaction inference correspond to a common time period and common location, and generate analytics information based on the storage structure inference and the interaction inference.
Aspects of the present disclosure include methods, systems, and non-transitory computer readable media for receiving a magnetic signal from a magnetic signal transmitter, determining a strength of the magnetic signal at the security tag, receiving a radio frequency identification (RFID) interrogatory signal from a RFID scanner, and transmitting a RFID response signal, to the RFID scanner, indicating the strength of the magnetic signal.
Aspects of the present disclosure include methods, systems, and non-transitory computer readable media for identifying one or more authorized signal characteristic associated with at least one authorized RF signal, receiving at least one incoming RF signal having one or more incoming signal characteristic, identifying the one or more incoming signal characteristic, determining a presence of the unauthorized RF device based on at least one of the one or more authorized signal characteristic or the one or more incoming signal characteristic, and activating an alarm in response to determining the presence of the unauthorized RF device.
A system may be configured to reliably identify, track, and collect data on a person of interest. In some aspects, the system may detect a facial representation within an image, generate a bounding box corresponding to the facial representation, determine an enhanced facial representation based at least in part on the bounding box and an image enhancement pipeline, and extract a plurality of facial features from the enhanced facial representation. Further, the system may determine quality information based on the plurality of facial features, determine that the quality information is greater than a threshold, and store the plurality of facial features in a data structure. In some aspects, the facial features may be used to identify red shoppers and green shoppers in a controlled environment.
G06V 40/16 - Human faces, e.g. facial parts, sketches or expressions
G06T 7/73 - Determining position or orientation of objects or cameras using feature-based methods
G06V 20/52 - Surveillance or monitoring of activities, e.g. for recognising suspicious objects
G08B 13/196 - Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
H04K 3/00 - Jamming of communication; Counter-measures
G06F 18/214 - Generating training patterns; Bootstrap methods, e.g. bagging or boosting
Disclosed herein are apparatuses and methods for classifying person type in a visual medium. The implementations include identifying a person in an image, generating a visual boundary around the identified person, and dividing the image into a plurality of image portions such that multiple images portions partially depict the identified person inside the visual boundary. The implementations include generating the divided image on a user interface that prompts a user to select each portion that at least partially depicts a person of a predetermined type. The implementations include receiving a selection of at least one portion. The implementations include generating, for a machine learning model and in response to determining that the selection comprises the identified person, a training input that comprises a training image and a tag indicating that the identified person is of the predetermined type. Additionally, the implementations include storing the training input in memory.
A radio-frequency (RF) identification (RFID) system provides side-lobe blocking (SLB) functionality. The RFID system modifies a first RF signal to provide a modified signal. The first RF signal has an RF carrier frequency according to an RFID protocol, and a main directional antenna in the RFID system has a first main lobe extending in a first direction and is configured to radiate a first signal for reading one or more RFID tags according to the RFID protocol. The RFID system then provides the modified signal as an SLB signal to a secondary directional antenna having a second main lobe extending in a second direction different than the first direction to radiate a second signal toward one or more stray RFID tags.
Systems and methods for operating a security tag. The methods comprise: receiving a first wireless signal using a receive circuit of the security tag; inducing a voltage in the receive circuit of the security tag while the first wireless signal is being received; performing operations by a controller to selectively close a switch while the voltage is being induced in the circuit; causing a release of a mechanical component of the security tag by allowing energy to flow from the receive circuit to the mechanical component when the switch is closed; and performing operations by the controller to prevent damage to the mechanical component as a result of the security tag being a certain distance from an external device.
G06K 19/07 - Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards with integrated circuit chips
H04B 5/02 - Near-field transmission systems, e.g. inductive loop type using transceiver
A security tag including a housing and a pin. The housing includes a pin shaft securement mechanism internal to the housing. The pin is aligned with the securement mechanism and includes a pin head and a pin shaft. The a pin shaft: extends from the pin head in a first direction, is coupled to the pin head in the first direction, is free to rotate about a longitudinal axis of the pin shaft with respect to the pin head, and is releasably securable at an end of the pin shaft distal to the pin head by the pin shaft securement mechanism. Transfer of pin head rotation to the pin shaft is prevented at least when the shaft is secured by the securement mechanism.
A system may include a security controller communicatively coupled with pedestals having a first set of antennas and a second set of antennas spaced from the first set of antennas to form an interrogation zone. The security controller may be configured to alternate transmission and reception of interrogation signals between the first set of antennas and the second set of antennas. The security controller may be configured to determine whether a metal object is detected in the interrogation zone in response to the reception of the interrogation signals by the second set of antennas or by the first set of antennas. The security controller may be configured to generate and send an alarm signal in response to the metal object being detected in the interrogation zone.
Systems and methods for coupling a tag to an item. The methods comprise: dispensing the tag from a tag feeder of a tag applicator; performing first operations by the tag applicator to mechanically move the tag into a nest of the tag applicator; determining if a given criteria is met based on feedback information received from at least one of a user of the tag applicator and a sensor provided with the tag applicator; and performing second operations by the tag applicator to couple the tag to the item, when a determination is made that the given criteria is met.
G08B 13/24 - Electrical actuation by interference with electromagnetic field distribution
E05B 73/00 - Devices for locking portable objects against unauthorised removal; Locking devices not provided for in other groups of this subclass
F16B 21/00 - Means without screw-thread for preventing relative axial movement of a pin, spigot, shaft, or the like and a member surrounding it; Stud-and-socket releasable fastenings without screw-thread
G06Q 10/087 - Inventory or stock management, e.g. order filling, procurement or balancing against orders
B62H 5/00 - Appliances preventing or indicating unauthorised use or theft of cycles; Locks integral with cycles