A method and system for securing a security tag into an article of clothing includes positioning the security tag into an opening to a gap or interface space between two layers of the article of clothing, and sewing together the two layers to contain the security tag in the interface space. Also described herein is a security tag configured for placement into the gap or interface space and affixing between the two layers of the article of clothing.
D05B 35/06 - Éléments d'alimentation ou de manutention de l'ouvrage pour machines à coudre non prévus ailleurs pour fixer les bandes, rubans, bandes étroites ou passements, ou pour bordage
Aspects of the present disclosure include methods, systems, and non-transitory computer readable media that perform actions of receiving, from a first RFID reader disposed at an egress zone, egress event information associated with the first RFID reader receiving a first RFID response signal from an RFID tag appended to a merchandise, determining an occurrence of a shrink event associated with the merchandise based on the egress event information and an absence of restricted access area information that indicates the RFID tag has not been scanned by a second RFID reader disposed at an restricted access area, identifying one or more features, one or more objects, or environmental information associated with a person triggering the egress event, and generating a data file including data associated with the shrink event.
The present aspects include a detacher with a housing having at least one wall that defines a nest configured to receive the security tag. The detacher may include a gate assembly including a gate member and an actuator, wherein the actuator is configured to move the gate member between a closed position wherein the gate member at least partially restricts access to the nest preventing unlocking of the security tag, and an open position wherein the gate member retracts to provide the access to the nest and the unlocking of the security tag. The detacher may include a processor in communication with the actuator and with a transaction system, wherein the processor is configured to control the actuator to move the gate member from the closed position to the open position based on receipt of the unlock signal from the transaction system.
E05B 73/00 - Dispositifs de verrouillage pour objets portatifs empêchant un déplacement non autoriséDispositifs de verrouillage non prévus dans les autres groupes de la présente sous-classe
4.
ELECTRONIC ARTICLE SURVEILLANCE TAG WITH THREAD ANTENNA
An article surveillance tag includes: a fabric material defining a top layer and a bottom layer; an antenna comprising: an electrically-conductive thread interfixed into one of the top layer or the bottom layer of the fabric material, wherein the electrically-conductive thread comprises a metal filament and a metal-coated non-metallic filament; and an induction loop overlapping with the electrically-conductive thread, wherein the induction loop comprises metallic material; and a radio frequency identification device electrically coupled with the induction loop.
G06K 19/02 - Supports d'enregistrement pour utilisation avec des machines et avec au moins une partie prévue pour supporter des marques numériques caractérisés par l'utilisation de matériaux spécifiés, p. ex. pour éviter l'usure pendant le transport à travers la machine
G06K 19/077 - Détails de structure, p. ex. montage de circuits dans le support
G08B 13/24 - Déclenchement électrique par une interférence avec la distribution d'un champ électromagnétique
A security tag includes: an inlay; an antenna mounted on the inlay; a radio frequency identifier (RFID) circuit coupled with the antenna; a sleeve encompassing the RFID circuit, the antenna, and the inlay; and at least one of: the RFID circuit, antenna, and inlay configured to be movable within the sleeve; a plurality of openings along a portion of a length of the antenna; a flexible seal at one or both ends of the sleeve; or a reinforcement layer adjacent to the inlay or the RFID chip.
G06K 19/02 - Supports d'enregistrement pour utilisation avec des machines et avec au moins une partie prévue pour supporter des marques numériques caractérisés par l'utilisation de matériaux spécifiés, p. ex. pour éviter l'usure pendant le transport à travers la machine
G06K 19/077 - Détails de structure, p. ex. montage de circuits dans le support
G08B 13/24 - Déclenchement électrique par une interférence avec la distribution d'un champ électromagnétique
6.
SYSTEM AND METHOD OF DISPENSING SECURITY TAGS WITH TEAR- AWAY FEATURE
B65H 1/08 - Supports ou magasins pour les piles dans lesquelles on prélève des articles avec moyens pour faire avancer la pile en vue de présenter les articles à un dispositif d'enlèvement
B65H 79/00 - Mécanismes d'entraînement des dispositifs pour faire défiler, enrouler, dérouler ou emmagasiner le matériau, non prévus ailleurs
D06F 93/00 - Dispositifs de comptage, de triage ou marquage adaptés spécialement pour usage en blanchisserie
B65C 11/00 - Distributeurs d'étiquettes à commande manuelle, p. ex. modifiés pour permettre l'application d'étiquettes sur des objets
B65H 37/00 - Appareils délivrant des articles ou des bandes, comportant des dispositifs pour exécuter des opérations auxiliaires particulières
Aspects of the present disclosure relates to security tag associated with a plurality of security tags comprising: a sleeve having a first tensile strength, and an inlay having a second tensile strength, the inlay being disposed movably within the sleeve and including, an antenna mounted on the inlay, and a radio frequency identifier (RFID) circuit coupled with the antenna, and a first tab and a second tab each having a third tensile strength, wherein at least one of the first tab or the second tab is configured to detachably couple the security tag with an adjacent one of the plurality of security tags, wherein the first tensile strength is smaller than the second tensile strength and larger than the third tensile strength. Additional aspects include a dispenser of a string of the plurality of security tags, and a process for making the plurality of security tags.
G06K 19/02 - Supports d'enregistrement pour utilisation avec des machines et avec au moins une partie prévue pour supporter des marques numériques caractérisés par l'utilisation de matériaux spécifiés, p. ex. pour éviter l'usure pendant le transport à travers la machine
G06K 19/077 - Détails de structure, p. ex. montage de circuits dans le support
G08B 13/24 - Déclenchement électrique par une interférence avec la distribution d'un champ électromagnétique
8.
DRONE RESPONSE TO LOSS DETECTION EVENT AND REPEAT OFFENDER
Examples described herein generally relate to a system and method for deploying an unmanned drone in response to a suspected loss event. The system is configured to detect a suspected loss condition at a premises. The system is configured to deploy a drone in response to the suspected loss condition. The drone is configured to identify a suspected person involved in the suspected loss condition at a first location within the premises. The drone is configured to follow the suspected person from the first location to a second location outside the premises. The drone can detect a first characteristic associated with a person that matches a record in a repeat offender database; monitor a second characteristic from the record in the repeat offender database; and activate a security measure for the premises prior to the person entering the premises based on a risk score for the record.
9.
ANTENNA AND RADIO FREQUENCY IDENTIFICATION (RFID) LABEL WITH INDUCTIVE LOOP
An antenna and a radio frequency identification (RFID) label is described. The antenna includes one or more loops. Each loop has one or more crossing points where portions of the antenna are in contact with each other. The antenna has an insulated coating to prevent physical contact of conductive material of the antenna at the crossing point. The RFID label includes an RFID transponder and the antenna coupled to the RFID transponder. The RFID transponder includes an integrated circuit and an inductive loop electronically coupled to the integrated circuit. The inductive loop has at least one meander-shaped portion.
G06K 19/077 - Détails de structure, p. ex. montage de circuits dans le support
G06K 19/02 - Supports d'enregistrement pour utilisation avec des machines et avec au moins une partie prévue pour supporter des marques numériques caractérisés par l'utilisation de matériaux spécifiés, p. ex. pour éviter l'usure pendant le transport à travers la machine
The present disclosure relates generally to security tags, and more specifically relates to electronic article surveillance (EAS) tags. The tag prevents unauthorized removal of an article as well as triggers an alarm when the tag is attempted for tampering. The tag comprises a housing, a switch, and a processing circuit. The switch includes a first contact coupled with the housing and a second contact coupled with an article. The second contact is movable relative to the first contact. The processing circuit is provided to detect electrical disconnection between the first contact and the second contact, and trigger an alarm upon detecting the electrical disconnection.
G08B 13/24 - Déclenchement électrique par une interférence avec la distribution d'un champ électromagnétique
G08B 7/06 - Systèmes de signalisation selon plus d'un des groupes Systèmes d'appel de personnes selon plus d'un des groupes utilisant une transmission électrique
11.
METHODS AND SYSTEMS FOR PERSON INSIGHT BASED ON MOVEMENT OR DWELLING WITHIN AN ESTABLISHMENT
Systems and methods are disclosed for receiving, for each of the multiple zones,an entering count of persons that entered the zone during a time period and an exiting count of persons that exited the zone during the time period, and/or computing, for each second level zone of one or more second level zones, a percentage of persons that traveled a direct path from the first level zone to the second level zone based on the exiting count of persons that exited the first level zone and the entering count of persons that entered the second level zone. In other examples, behavioral personas can be assigned to persons within the zone based on the time the person is within the zone.
G06Q 10/06 - Ressources, gestion de tâches, des ressources humaines ou de projetsPlanification d’entreprise ou d’organisationModélisation d’entreprise ou d’organisation
G06Q 30/0201 - Modélisation du marchéAnalyse du marchéCollecte de données du marché
A dual RFID and AM label or tag, and method for making the same, including a first housing portion comprising a first bio-degradable material and having a side wall defining a cavity, a second housing portion comprising a second bio-degradable material and connected to the first housing portion, an acousto-magnetic resonator sized to moveably fit within the cavity, and an RFID label associated with one of the first housing portion or the second housing portion.
G06K 19/02 - Supports d'enregistrement pour utilisation avec des machines et avec au moins une partie prévue pour supporter des marques numériques caractérisés par l'utilisation de matériaux spécifiés, p. ex. pour éviter l'usure pendant le transport à travers la machine
G06K 19/07 - Supports d'enregistrement avec des marques conductrices, des circuits imprimés ou des éléments de circuit à semi-conducteurs, p. ex. cartes d'identité ou cartes de crédit avec des puces à circuit intégré
G06K 19/077 - Détails de structure, p. ex. montage de circuits dans le support
G07G 3/00 - Indicateurs d'alarme, p. ex. sonneries
G08B 13/24 - Déclenchement électrique par une interférence avec la distribution d'un champ électromagnétique
A radio frequency identification (RFID) label includes a textile sheet having affixed thereto a conductive wire pattern and a RF chip. The textile sheet includes a first end portion, a. second end portion, and a middle portion arranged between the first and second end portions. The conductive wire pattern includes a first part affixed to the first end portion, a second part affixed to the second end portion, and third part affixed to the middle portion and coupled to the first and second parts of the conductive wire pattern, The RF chip is attached on the middle portion and positioned on a. first face of the textile sheet and coupled to the third part of the conductive wire pattern. The first and second end portions are folded toward the first face of the textile sheet such that the first and second parts of the conductive wire pattern are covered by the middle portion.
G06K 19/02 - Supports d'enregistrement pour utilisation avec des machines et avec au moins une partie prévue pour supporter des marques numériques caractérisés par l'utilisation de matériaux spécifiés, p. ex. pour éviter l'usure pendant le transport à travers la machine
G06K 19/077 - Détails de structure, p. ex. montage de circuits dans le support
15.
SYSTEM AND METHOD FOR AUTOMATED OPT-IN FOR TRACKING INDIVIDUALS
A device may include one or more memories, individually or in combination, having instructions; and one or more processors, individually or in combination, configured to execute the instructions and cause the system to: detect a person entering an area, generate a notification requesting that the person check-in with an electronic device associated with the area; and display the notification.
Systems and methods are disclosed for alerting suspicious activity in an establishment, including detecting, based on using machine learning to process video received from one or more cameras in the establishment, potential suspicious activity occurring in the establishment, and displaying, on a public view monitor near a location of the potential suspicious activity and based on detecting the potential suspicious activity, an indication of the potential suspicious activity.
G08B 13/196 - Déclenchement influencé par la chaleur, la lumière, ou les radiations de longueur d'onde plus courteDéclenchement par introduction de sources de chaleur, de lumière, ou de radiations de longueur d'onde plus courte utilisant des systèmes détecteurs de radiations passifs utilisant des systèmes de balayage et de comparaison d'image utilisant des caméras de télévision
G08B 13/24 - Déclenchement électrique par une interférence avec la distribution d'un champ électromagnétique
17.
METHODS AND SYSTEMS FOR TRIGGERING ACTIVITY DETECTION IN RETAIL ESTABLISHMENTS
Systems and methods are disclosed for assisting a security system in detecting activities in an establishment including receiving, from a device carried by an employee associated with the establishment, a wireless signal indicating an activity to be detected, obtaining, based on the wireless signal, location information for the activity, and operating, based on the wireless signal, one or more sensors of the security system to detect the activity at a location identified based on the location information.
G08B 13/196 - Déclenchement influencé par la chaleur, la lumière, ou les radiations de longueur d'onde plus courteDéclenchement par introduction de sources de chaleur, de lumière, ou de radiations de longueur d'onde plus courte utilisant des systèmes détecteurs de radiations passifs utilisant des systèmes de balayage et de comparaison d'image utilisant des caméras de télévision
G08B 25/01 - Systèmes d'alarme dans lesquels l'emplacement du lieu où existe la condition déclenchant l'alarme est signalé à une station centrale, p. ex. systèmes télégraphiques d'incendie ou de police caractérisés par le moyen de transmission
18.
METHODS AND SYSTEMS FOR AUTOMATED SUSPECT IDENTIFICATION IN RETAIL ESTABLISHMENTS
Systems and methods are disclosed for identifying a suspect in an activity at an establishment, including obtaining, from a video of the activity, an image identifying the suspect, and identifying the suspect as a criminal in the video of the activity or other videos of activities.
Examples described herein generally relate to a system and. method for dynamically displaying a holographic image based on a tag detection. The system includes a sensing device configured to detect an identifier from a tag associated with an article. The system includes a computer system including one or more memories storing computer-executable instructions and one or more processors coupled, to the one or more memories and, individually or in combination, configured to: store a. status of articles, each article associated with a tag and an identifier; and select an image based on a location of tire sensing device and the status of the article. The system includes a holographic display configured to project the image.
A bar code may be integrated with a product, and a management platform may be configured to: receive a query for the mode information of the RFID chip via the bar code, identify the RFID chip based on the bar code; and transmit an indication of a mode of the RFID chip. The bar code may include a two-dimensional code, a quick response (QR code), a three-dimensional code, and/or any graphical or visual machine-readable code.
G06K 19/06 - Supports d'enregistrement pour utilisation avec des machines et avec au moins une partie prévue pour supporter des marques numériques caractérisés par le genre de marque numérique, p. ex. forme, nature, code
G06F 16/955 - Recherche dans le Web utilisant des identifiants d’information, p. ex. des localisateurs uniformisés de ressources [uniform resource locators - URL]
G06K 19/07 - Supports d'enregistrement avec des marques conductrices, des circuits imprimés ou des éléments de circuit à semi-conducteurs, p. ex. cartes d'identité ou cartes de crédit avec des puces à circuit intégré
21.
PRIVACY FOR RADIO-FREQUENCY IDENTIFICATION (RFID) TAG
A bar code (120) may be integrated with a product (116), and a management platform (123) may be configured to: receive a query for the mode information of the RFID chip (118) via the bar code, identify the RFID chip based on the bar code; and transmit an indication of a mode of the RFID chip. The bar code may include a two-dimensional code, a quick response (QR code), a three-dimensional code, and/or any graphical or visual machine-readable code.
G06K 17/00 - Méthodes ou dispositions pour faire travailler en coopération des équipements couverts par plusieurs des groupes principaux , p. ex. fichiers automatiques de cartes incluant les opérations de transport et de lecture
G06K 19/073 - Dispositions particulières pour les circuits, p. ex. pour protéger le code d'identification dans la mémoire
G06K 19/077 - Détails de structure, p. ex. montage de circuits dans le support
G06K 19/08 - Supports d'enregistrement pour utilisation avec des machines et avec au moins une partie prévue pour supporter des marques numériques caractérisés par le genre de marque numérique, p. ex. forme, nature, code utilisant des marquages de différentes sortes sur le même support d'enregistrement, p. ex. un marquage étant lu optiquement et l'autre par des moyens magnétiques
22.
INDEXABLE DISPENSING MACHINE WITH REMOTE ONLY PURCHASING CAPABILITY
Methods, systems, and apparatuses for dispensing remotely purchased merchandise, including offering merchandise for purchase by a customer via a network, assigning a dispensing code associated with purchased merchandise to the customer after the customer purchases the merchandise, checking the validity of a dispensing code for a dispensing machine, dispensing the purchased merchandise via the dispensing machine if the dispensing code is valid, and updating an index to reflect that the purchased merchandise was dispensed.
G06Q 20/18 - Architectures de paiement impliquant des terminaux en libre-service, des distributeurs automatiques, des bornes ou des terminaux multimédia
G06Q 20/32 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des dispositifs sans fil
G07F 7/08 - Mécanismes actionnés par des objets autres que des pièces de monnaie pour déclencher ou actionner des appareils de vente, de location, de distribution de pièces de monnaie ou de papier-monnaie, ou de remboursement par carte d'identité codée ou carte de crédit codée
G07F 9/00 - Parties constitutives autres que celles particulières à des genres ou types particuliers d'appareils
G07F 9/02 - Dispositifs pour donner l'alarme ou une indication, p. ex. quand l'appareil est videAménagements publicitaires des appareils déclenchés par des pièces de monnaie
G07F 17/40 - Appareils déclenchés par pièces de monnaie pour la location d'articlesInstallations ou services déclenchés par pièces de monnaie pour dispositifs pour recevoir des commandes, de la publicité ou analogues
Example implementations include a method, apparatus and computer-readable medium for automated sprinter detection, comprising receiving one or more images from one or more image sensors associated with a security system. The implementations further include identifying a person in the one or more images. Additionally, the implementations further include calculating an acceleration of the person based on tracking of the person in the one or more images. Additionally, the implementations further include identifying the person as a sprinter based on the acceleration. Additionally, the implementations further include causing autonomous execution of one or more sprinter response actions in response to identifying the person as the sprinter.
G06V 10/62 - Extraction de caractéristiques d’images ou de vidéos relative à une dimension temporelle, p. ex. extraction de caractéristiques axées sur le tempsSuivi de modèle
G06V 20/52 - Activités de surveillance ou de suivi, p. ex. pour la reconnaissance d’objets suspects
G06V 40/20 - Mouvements ou comportement, p. ex. reconnaissance des gestes
Example implementations include a method, apparatus and computer-readable medium for person detection by a computer device, including retrieving, from a database of suspicious persons, a profile of a person detected in at least one image, wherein the profile lists crime incidents associated with the person. The implementations include determining, using the profile, a scale of crimes committed by the person based on an amount of time between incidents of a certain type, wherein the certain type is one of theft at a store or theft of a particular product type. The implementations include determining a rank of the person in the database of suspicious persons based on a frequency and the scale of crimes committed by the person compared to other suspicious persons, and transmitting, to a second computer device, the retrieved profile and a notification that indicates that the person is detected when the rank exceeds a threshold rank.
G06V 10/74 - Appariement de motifs d’image ou de vidéoMesures de proximité dans les espaces de caractéristiques
G06V 20/52 - Activités de surveillance ou de suivi, p. ex. pour la reconnaissance d’objets suspects
G06V 40/16 - Visages humains, p. ex. parties du visage, croquis ou expressions
G06V 40/20 - Mouvements ou comportement, p. ex. reconnaissance des gestes
G06V 40/50 - Traitement de données biométriques ou leur maintenance
G08B 13/196 - Déclenchement influencé par la chaleur, la lumière, ou les radiations de longueur d'onde plus courteDéclenchement par introduction de sources de chaleur, de lumière, ou de radiations de longueur d'onde plus courte utilisant des systèmes détecteurs de radiations passifs utilisant des systèmes de balayage et de comparaison d'image utilisant des caméras de télévision
G08B 31/00 - Systèmes d'alarme à prédiction caractérisés par une extrapolation ou un autre type de calcul utilisant des données historiques mises à jour
H04N 7/18 - Systèmes de télévision en circuit fermé [CCTV], c.-à-d. systèmes dans lesquels le signal vidéo n'est pas diffusé
H04N 23/66 - Commande à distance de caméras ou de parties de caméra, p. ex. par des dispositifs de commande à distance
H04N 23/69 - Commande de moyens permettant de modifier l'angle du champ de vision, p. ex. des objectifs de zoom optique ou un zoom électronique
H04N 23/695 - Commande de la direction de la caméra pour modifier le champ de vision, p. ex. par un panoramique, une inclinaison ou en fonction du suivi des objets
26.
SYSTEMS AND METHODS FOR SELF-SERVICE ACCESS TO SECURED MERCHANDISE BY A TRUSTED CUSTOMER
Facilitating trusted customer access to secure locking compartments allowing authorized removal of items from a retail facility where the items are stored in the secure locking compartments. Use of a PMCD to obtain authorization based on recognition as a trusted customer is included. The authorization is then checked at a secure locking compartment and if validated, removal of secured items is permitted by unlocking.
G06F 21/36 - Authentification de l’utilisateur par représentation graphique ou iconique
G06Q 30/06 - Transactions d’achat, de vente ou de crédit-bail
H04W 4/80 - Services utilisant la communication de courte portée, p. ex. la communication en champ proche, l'identification par radiofréquence ou la communication à faible consommation d’énergie
H04W 12/47 - Dispositions de sécurité utilisant des modules d’identité utilisant la communication en champ proche [NFC] ou des modules d’identification par radiofréquence [RFID]
27.
ELECTRONIC ARTICLE SURVEILLANCE SECURITY DEVICE AND KIT
An electronic article surveillance security device includes an antenna assembly configured to fit within a housing member, wherein the antenna assembly comprises a first antenna, a transmitter, and a receiver respectively configured to transmit a first signal to an electronic article surveillance tag device and to receive a second signal from the electronic article surveillance tag device. Additionally, the device includes a bracket member connected to the antenna assembly and configured to secure the antenna assembly, and a securing mechanism connecting the bracket member to a surface.
An electronic article surveillance security device includes an antenna assembly configured to fit within a housing member, wherein the antenna assembly comprises a first antenna, a transmitter, and a receiver respectively configured to transmit a first signal to an electronic article surveillance tag device and to receive a second signal from the electronic article surveillance tag device. Additionally, the device includes a bracket member connected to the antenna assembly and configured to secure the antenna assembly, and a securing mechanism connecting the bracket member to a surface.
Aspects of the present disclosure relate generally to a vision system that detects objects moving in an environment. The vision system detects objects that crossed a boundary of an environment during a first period of time, and determines a count of objects that crossed the boundary in a first direction. The vision system retrieves historical egress and ingress data for a second period of time corresponding to the first period of time. The historical egress and ingress data comprises a detected historic count of crossings in the first direction and a corrected historic count of crossings in the first direction. The vision system calculates an error rate for the second period of time based on a ratio of the detected historic count and the corrected historic count, and determines a corrected count for the first period of time by adjusting the count using the error rate.
Apparatus and methods for self-checkout at a retail establishment includes receiving, by a sensor gate and from a payment processing device, purchase transaction information related to a purchase by a customer. The sensor gate scans customized label attached to each article possessed by the customer located in a surveillance zone of the retail establishment. The sensor gate compares information contained in the customized label with the received purchase transaction information.
G06Q 20/18 - Architectures de paiement impliquant des terminaux en libre-service, des distributeurs automatiques, des bornes ou des terminaux multimédia
G06K 7/10 - Méthodes ou dispositions pour la lecture de supports d'enregistrement par radiation électromagnétique, p. ex. lecture optiqueMéthodes ou dispositions pour la lecture de supports d'enregistrement par radiation corpusculaire
G06Q 20/20 - Systèmes de réseaux présents sur les points de vente
G07C 9/29 - Enregistrement de l’entrée ou de la sortie d'une entité isolée comportant l’utilisation d’un laissez-passer le laissez-passer comportant des éléments électroniques actifs, p. ex. des cartes à puce
Example implementations include a method, apparatus and computer-readable medium for person detection in a security system, comprising receiving a video stream captured by a camera installed in an environment. The implementations further include identifying a first person in one or more images of the video stream. Additionally, the implementations further include extracting a plurality of visual attributes of the first person that do not include personal identifiable information from the one or more images, wherein the personal identifiable information is a data point unique to the first person that can identify the first person without any other data points. Additionally, the implementations further include encoding the plurality of visual attributes into a first signature representing the first person. Additionally, the implementations further include generating a security alert in response to the first signature corresponding to a second signature of a second person tagged as a security risk.
G06V 40/10 - Corps d’êtres humains ou d’animaux, p. ex. occupants de véhicules automobiles ou piétonsParties du corps, p. ex. mains
G06V 10/40 - Extraction de caractéristiques d’images ou de vidéos
G06V 10/74 - Appariement de motifs d’image ou de vidéoMesures de proximité dans les espaces de caractéristiques
G06V 20/52 - Activités de surveillance ou de suivi, p. ex. pour la reconnaissance d’objets suspects
G08B 13/196 - Déclenchement influencé par la chaleur, la lumière, ou les radiations de longueur d'onde plus courteDéclenchement par introduction de sources de chaleur, de lumière, ou de radiations de longueur d'onde plus courte utilisant des systèmes détecteurs de radiations passifs utilisant des systèmes de balayage et de comparaison d'image utilisant des caméras de télévision
32.
SYSTEMS AND METHODS FOR PERSON DETECTION AND CLASSIFICATION
Example implementations include a method, apparatus and computer-readable medium for person detection in a security system, comprising receiving a video stream captured by a camera installed in an environment. The implementations further include identifying a first person in one or more images of the video stream. Additionally, the implementations further include extracting a plurality of visual attributes of the first person that do not include personal identifiable information from the one or more images, wherein the personal identifiable information is a data point unique to the first person that can identify the first person without any other data points. Additionally, the implementations further include encoding the plurality of visual attributes into a first signature representing the first person. Additionally, the implementations further include generating a security alert in response to the first signature corresponding to a second signature of a second person tagged as a security risk.
G06V 10/56 - Extraction de caractéristiques d’images ou de vidéos relative à la couleur
G06V 20/52 - Activités de surveillance ou de suivi, p. ex. pour la reconnaissance d’objets suspects
G06V 40/10 - Corps d’êtres humains ou d’animaux, p. ex. occupants de véhicules automobiles ou piétonsParties du corps, p. ex. mains
G08B 13/196 - Déclenchement influencé par la chaleur, la lumière, ou les radiations de longueur d'onde plus courteDéclenchement par introduction de sources de chaleur, de lumière, ou de radiations de longueur d'onde plus courte utilisant des systèmes détecteurs de radiations passifs utilisant des systèmes de balayage et de comparaison d'image utilisant des caméras de télévision
An article security device that is selectively removable from an article, the article security device may include a security tag and an elongate member movably connected with the security tag and having an elongate member first end and a elongate member second end. The elongate member may be configured to contain or to be contained by at least a portion of the article. The security device may further include a selectively removable locking member that is configured to connect to the elongate member second end to enable the security device to be selectively removable from the article, wherein the selectively removable locking member includes a locking mechanism having a locked position relative to the elongate member second end and an unlocked position relative to the elongate member second end.
E05B 73/00 - Dispositifs de verrouillage pour objets portatifs empêchant un déplacement non autoriséDispositifs de verrouillage non prévus dans les autres groupes de la présente sous-classe
A secured article may include a tag set comprising a first tag and a second tag, each tag attached to the article. A secured article may include a disablement structure. A secured article may include attached to the article in physical proximity to the first tag. A secured article may include in electromagnetic relationship with the second tag. A secured article may include disabling operation of the second tag absent altering the electromagnetic relationship.
E05B 73/00 - Dispositifs de verrouillage pour objets portatifs empêchant un déplacement non autoriséDispositifs de verrouillage non prévus dans les autres groupes de la présente sous-classe
B65C 5/00 - Étiquetage sur tissus ou matériaux ou objets comparables à surface déformable, p. ex. papier, rouleaux de tissus, bas, chaussures
A secured article may include a tag set comprising a first tag and a second tag, each tag attached to the article. A secured article may include a disablement structure. A secured article may include attached to the article in physical proximity to the first tag. A secured article may include in electromagnetic relationship with the second tag. A secured article may include disabling operation of the second tag absent altering the electromagnetic relationship.
Systems and methods for determining and using electronic tag motion may include a database storing a plurality of last read signal strength values and phase values for each electronic tag, for each antenna, for each polarization, and for each frequency of transmission. Based on the information in the database, the system may make a more accurate determination whether an electronic tag is moving or stationary, as compared to conventional methods used for determining motion of electronic tags.
G01S 13/75 - Systèmes utilisant la reradiation d'ondes radio, p. ex. du type radar secondaireSystèmes analogues utilisant des transpondeurs alimentés par les ondes reçues, p. ex. utilisant des transpondeurs passifs
Examples described herein generally relate to a system for monitoring tags in a retail environment. The system includes an exit system including one or more radio frequency identification (RFID) readers that read a tag to obtain exit system measurements associated with a tag detection event. The system includes a memory and a processor configured to execute instructions to configuring each of a plurality of exit gates including a plurality of RFID readers with a different operating frequency than the plurality of RFID readers at an adjacent exit gate. The processor is configured to synchronize the plurality of RFID readers at each exit gate to prevent two readers at the exit gate from concurrently talking with overlapping coverage areas and a same polarization. The processor is configured to detect one or more tags within the coverage areas.
G06K 7/10 - Méthodes ou dispositions pour la lecture de supports d'enregistrement par radiation électromagnétique, p. ex. lecture optiqueMéthodes ou dispositions pour la lecture de supports d'enregistrement par radiation corpusculaire
G06K 7/00 - Méthodes ou dispositions pour la lecture de supports d'enregistrement
38.
SYSTEMS AND METHODS FOR OBJECT DETECTION IN AN ENVIRONMENT
Disclosed herein are apparatuses and methods for object detection in an environment. An implementation may comprise detecting, using at least one sensor, persons that entered and exited the environment during a first period of time and determining an entry count and an exit count accordingly. The implementation may comprise retrieving, from a database, historical ingress and egress data comprising entry and exit counts of the environment for a second period of time. The implementation may comprise determining an amount of expected exit counts for the first period of time based on the historical ingress and egress data of the second period of time by fitting the historical ingress and egress data to a first probability distribution. The implementation may comprise updating the exit count for the first period of time to the amount of expected exit counts and storing the updated exit count in the database.
Disclosed herein are apparatuses and methods for providing contextual data for a security event in an environment. An implementation may comprise receiving and parsing sensor data from a plurality of sensors located in the environment. The implementation may comprise storing, in a database, the parsed sensor data comprising identifiers of the plurality of objects and the attributes. The implementation may comprise detecting a security event at the environment and determining a type, a time window, and a location of the security event. The implementation may comprise retrieving, from the database, a set of object identifiers with timestamps within the time window and a matching location of the security event. The implementation may comprise filtering, from the set of object identifiers, at least one object identifier that matches the type of the security event, and outputting the at least one object identifier and attributes of the at least one object identifier.
Disclosed herein are apparatuses and methods for tracking occupancy count in an environment based on detected movements and dwell time. An implementation may comprise detecting a person in a plurality of image frames captured by a camera. The implementation may comprise tracking a movement of the person and determining that the person has crossed a boundary within the plurality of image frames. The implementation may comprise identifying a path of the person based on the tracked movement and may comprise calculating a dwell time in response to determining that a difference between the identified path and at least one target path associated with entering or exiting the environment exceeds a threshold difference. The implementation may comprise comparing the dwell time to a target dwell time, and updating and storing the occupancy count of the environment in response to determining that the dwell time is less than the target dwell time.
An AM label and method for making the AM label, where the AM label may include a first housing portion comprising a first bio-degradable material and having a side wall defining a cavity. The AM label may include a second housing portion comprising a second bio-degradable material and connected to the first housing portion. The AM label may include an acousto-magnetic resonator sized to moveably fit within the cavity.
G06K 19/06 - Supports d'enregistrement pour utilisation avec des machines et avec au moins une partie prévue pour supporter des marques numériques caractérisés par le genre de marque numérique, p. ex. forme, nature, code
42.
BIO-DEGRADABLE ACOUSTO-MAGNETIC LABEL AND METHOD OF MAKING SAME
An AM label and method for making the AM label, where the AM label may include a first housing portion comprising a first bio-degradable material and having a side wall defining a cavity. The AM label may include a second housing portion comprising a second bio-degradable material and connected to the first housing portion. The AM label may include an acousto-magnetic resonator sized to moveably fit within the cavity.
Systems and methods are disclosed for detecting a security event at an establishment, obtaining, based on detecting the security event, vehicle information associated with a vehicle used in conjunction with the security event, storing the vehicle information, detecting, based on the vehicle information, the vehicle arriving at the establishment or another establishment, and generating, based on detecting the vehicle arriving at the establishment or another establishment, a notification that the vehicle has arrived at the establishment or another establishment.
Systems and methods are disclosed for detecting a security event at an establishment, obtaining, based on detecting the security event, vehicle information associated with a vehicle used in conjunction with the security event, storing the vehicle information, detecting, based on the vehicle information, the vehicle arriving at the establishment or another establishment, and generating, based on detecting the vehicle arriving at the establishment or another establishment, a notification that the vehicle has arrived at the establishment or another establishment.
G08B 13/196 - Déclenchement influencé par la chaleur, la lumière, ou les radiations de longueur d'onde plus courteDéclenchement par introduction de sources de chaleur, de lumière, ou de radiations de longueur d'onde plus courte utilisant des systèmes détecteurs de radiations passifs utilisant des systèmes de balayage et de comparaison d'image utilisant des caméras de télévision
G08B 13/24 - Déclenchement électrique par une interférence avec la distribution d'un champ électromagnétique
G08B 29/18 - Prévention ou correction d'erreurs de fonctionnement
Security event characterization and response includes, for each of a plurality of first security data collection events determining that the first event has started. Collecting, in a database, an event data record associated with the first event determined to have started, the event data record comprising gait information of a person associated with the first event. For a given security data collection event later than the plurality of first events, determining that the given event has started. Detecting given event data comprising gait information of a person associated with the given event determined to have started. Determining a similarity meeting a threshold similarity between the query and one or more sets of records of the database. Initiating an action based on the one or more sets of records of the database determined to meet a threshold similarity with the query.
G08B 13/196 - Déclenchement influencé par la chaleur, la lumière, ou les radiations de longueur d'onde plus courteDéclenchement par introduction de sources de chaleur, de lumière, ou de radiations de longueur d'onde plus courte utilisant des systèmes détecteurs de radiations passifs utilisant des systèmes de balayage et de comparaison d'image utilisant des caméras de télévision
G08B 13/24 - Déclenchement électrique par une interférence avec la distribution d'un champ électromagnétique
A security tag includes: an elongated inlay portion; an antenna mounted on the elongated inlay portion; and a radio frequency identification (RFID) circuit coupled with the antenna. The security tag may be encapsulated within an elongated textile protective sleeve. At least one of the elongated inlay portion, the antenna or the RFID circuit are adapted to dissolve in water.
Examples described herein generally relate to a system and method for tracking items. The system may detect an unauthorized removal of an item tagged with an active radio tag associated with an item identifier. The system may activate, in response to the unauthorized removal, tracking of the active radio tag, wherein after activation of the tracking, the active radio tag transmits the item identifier. The system may collect, at a database, the item identifier and location information indicating a location of the item when the item identifier was transmitted. The system may display the location information from the database for one or more items including the item.
G08B 13/24 - Déclenchement électrique par une interférence avec la distribution d'un champ électromagnétique
H04W 4/021 - Services concernant des domaines particuliers, p. ex. services de points d’intérêt, services sur place ou géorepères
H04W 4/029 - Services de gestion ou de suivi basés sur la localisation
H04W 4/80 - Services utilisant la communication de courte portée, p. ex. la communication en champ proche, l'identification par radiofréquence ou la communication à faible consommation d’énergie
H04W 84/04 - Réseaux à grande échelleRéseaux fortement hiérarchisés
Security event characterization and response includes, for each of a plurality of first security data collection events determining that the first event has started. Collecting, in a database, an event data record associated with the first event determined to have started, the event data record comprising gait information of a person associated with the first event. For a given security data collection event later than the plurality of first events, determining that the given event has started. Detecting given event data comprising gait information of a person associated with the given event determined to have started. Determining a similarity meeting a threshold similarity between the query and one or more sets of records of the database. Initiating an action based on the one or more sets of records of the database determined to meet a threshold similarity with the query.
Example implementations include methods, apparatuses and computer-readable media for controlling access to a shared resource on a distributed network, comprising transmitting a multicast request packet to a plurality of hosts to request access to the shared resource. The implementations further include setting a first timer for a first predetermined period of time after transmitting the multicast request packet. Additionally, the implementations further include verifying that the shared resource is accessible, in response to determining that, during the first predetermined period of time, no multicast packets related to access to the shared resource have been received. Additionally, the implementations further include performing one or more operations on the shared resource, in response to verifying that the shared resource is accessible.
Examples described herein generally relate to a system and method for tracking tagged items outside of a retail environment. The system detects an unauthorized removal of an item tagged with an active radio tag associated with an item identifier and activate, in response to the unauthorized removal, tracking of the active radio tag. After activation of the tracking, the active radio tag transmits the item identifier and item location. The system collects, at a database, the item identifier and location information indicating a location of the item when the item identifier was transmitted and displays the location information.
Example implementations include methods, apparatuses and computer-readable media for controlling access to a shared resource on a distributed network, comprising transmitting a multicast request packet to a plurality of hosts to request access to the shared resource. The implementations further include setting a first timer for a first predetermined period of time after transmitting the multicast request packet. Additionally, the implementations further include verifying that the shared resource is accessible, in response to determining that, during the first predetermined period of time, no multicast packets related to access to the shared resource have been received. Additionally, the implementations further include performing one or more operations on the shared resource, in response to verifying that the shared resource is accessible.
H04L 47/70 - Contrôle d'admissionAllocation des ressources
H04L 12/18 - Dispositions pour la fourniture de services particuliers aux abonnés pour la diffusion ou les conférences
H04L 67/10 - Protocoles dans lesquels une application est distribuée parmi les nœuds du réseau
H04L 69/16 - Implémentation ou adaptation du protocole Internet [IP], du protocole de contrôle de transmission [TCP] ou du protocole datagramme utilisateur [UDP]
The present disclosure relates to a mechanism inside of the tag which detaches the tag when presented to a detacher system containing a rotating magnet array that retracts the tag pin allowing the tag to be removed from the garment.
Example aspects include techniques for reducing false alarms caused by stray tags. These techniques may include determining, by a processor of an EAS system, a chatter score of a RFID identification of an RFID tag that generated a quantity of RFID readings above a predefined threshold at one or more RFID readers, and selecting, by the processor of the EAS system, the RFID identification based at least in part on the chatter score being below a chatter score threshold. In addition, the techniques may include determining, by the processor of the EAS system, that the RFID identification corresponds to a RFID tag in motion, and triggering, by the processor of the EAS system, an alarm based on a determination that the RFID tag identified by the RFID identification is not authorized to leave a controlled area associated with the one or more RFID readers.
Example implementations include a method, apparatus and computer-readable medium for computer vision detection of dwell time, comprising receiving a plurality of indications of persons entering an environment over a period of time. The implementations further include adding, into a first-in-first-out (FIFO) queue, a respective identifier of a respective person entering the environment and an entry time for each of the plurality of indications, removing, from the FIFO queue, the respective identifier and the entry time of the respective person in response to an indication of an exit of the respective person from the environment at an exit time, calculating an estimated dwell time of the respective person based on a difference in the entry time and the exit time, and generating an alert based on calculating an average dwell time of the persons entering the environment over the period of time based on each estimated dwell time.
G06Q 10/04 - Prévision ou optimisation spécialement adaptées à des fins administratives ou de gestion, p. ex. programmation linéaire ou "problème d’optimisation des stocks"
G06Q 30/0202 - Prédictions ou prévisions du marché pour les activités commerciales
Example implementations include a method, apparatus and computer-readable medium for tracking queue space events, comprising receiving a plurality of data frames from a camera capturing a view of an environment. The implementations further include identifying in the plurality of data frames at least one queue space of the environment, tracking a position of a first person in the plurality of data frames, and calculating a dwell time of the first person when detecting that the position of the first person is in the at least one queue space. Additionally, the implementations include generating a queue delay indication in response to determining that the dwell time exceeds a threshold dwell time, and generating an alert that an attribute of the at least one queue space needs to be modified in response to determining that more than a threshold amount of queue delay indications have been generated within a period of time.
Example implementations include a method, apparatus and computer-readable medium for generating a visual model of a uniform, comprising detecting a plurality of persons in one or more images. The implementations further include generating a sub- image depicting the respective person from the one or more images for each respective person of the plurality of persons. Additionally, the implementations further include identifying one or more articles of clothing worn by the respective person, executing at least one transformation that adjusts pixels of the sub-image such that the one or more articles of clothing depicted in the sub-image fit in a common template, calculating variance values between a plurality of transformed sub-images comprising the sub- image transformed by the at least one transformation and other sub-images generated for other persons in the plurality of persons and transformed by the at least one transformation, and generating a virtual model based on the variance values.
G06T 7/37 - Détermination des paramètres de transformation pour l'alignement des images, c.-à-d. recalage des images utilisant des procédés de transformation de domaine
Example implementations include a method, apparatus and computer-readable medium for computer vision detection of dwell time, comprising receiving a plurality of indications of persons entering an environment over a period of time. The implementations further include adding, into a first-in-first-out (FIFO) queue, a respective identifier of a respective person entering the environment and an entry time for each of the plurality of indications, removing, from the FIFO queue, the respective identifier and the entry time of the respective person in response to an indication of an exit of the respective person from the environment at an exit time, calculating an estimated dwell time of the respective person based on a difference in the entry time and the exit time, and generating an alert based on calculating an average dwell time of the persons entering the environment over the period of time based on each estimated dwell time.
Example implementations include a method, apparatus and computer-readable medium for computer vision detection of a fall event, comprising detecting a person in a first image captured at a first time. The implementations further include identifying a plurality of keypoints on the person in an image, wherein the plurality of keypoints, when connected, indicate a pose of the person. Additionally, the implementations further include detecting, using the plurality of keypoints, that the person has fallen in response to determining that, subsequent to the pose being the standing pose in a previous image, the keypoints of the plurality of keypoints associated with the shoulders of the person are higher than the keypoints of the second plurality of keypoints associated with the eyes and the ears of the person in the second image. Additionally, the implementations further include generating an alert indicating that the person has fallen.
Example implementations include a method, apparatus and computer-readable medium for tracking queue space events, comprising receiving a plurality of data frames from a camera capturing a view of an environment. The implementations further include identifying in the plurality of data frames at least one queue space of the environment, tracking a position of a first person in the plurality of data frames, and calculating a dwell time of the first person when detecting that the position of the first person is in the at least one queue space. Additionally, the implementations include generating a queue delay indication in response to determining that the dwell time exceeds a threshold dwell time, and generating an alert that an attribute of the at least one queue space needs to be modified in response to determining that more than a threshold amount of queue delay indications have been generated within a period of time.
Example implementations include a method, apparatus and computer-readable medium for computer vision detection of a fall event, comprising detecting a person in a first image captured at a first time. The implementations further include identifying a plurality of keypoints on the person in an image, wherein the plurality of keypoints, when connected, indicate a pose of the person. Additionally, the implementations further include detecting, using the plurality of keypoints, that the person has fallen in response to determining that, subsequent to the pose being the standing pose in a previous image, the keypoints of the plurality of keypoints associated with the shoulders of the person are higher than the keypoints of the second plurality of keypoints associated with the eyes and the ears of the person in the second image. Additionally, the implementations further include generating an alert indicating that the person has fallen.
G06V 20/52 - Activités de surveillance ou de suivi, p. ex. pour la reconnaissance d’objets suspects
G06T 3/60 - Rotation d’images entières ou de parties d'image
G06T 7/73 - Détermination de la position ou de l'orientation des objets ou des caméras utilisant des procédés basés sur les caractéristiques
G06V 10/75 - Organisation de procédés de l’appariement, p. ex. comparaisons simultanées ou séquentielles des caractéristiques d’images ou de vidéosApproches-approximative-fine, p. ex. approches multi-échellesAppariement de motifs d’image ou de vidéoMesures de proximité dans les espaces de caractéristiques utilisant l’analyse de contexteSélection des dictionnaires
G06V 40/10 - Corps d’êtres humains ou d’animaux, p. ex. occupants de véhicules automobiles ou piétonsParties du corps, p. ex. mains
61.
SYSTEMS AND METHODS FOR GENERATING A VISUALIZATION OF WORKSPACE EMPLOYEES
Example implementations include a method, apparatus and computer-readable medium for generating a visual model of a uniform, comprising detecting a plurality of persons in one or more images. The implementations further include generating a sub-image depicting the respective person from the one or more images for each respective person of the plurality of persons. Additionally, the implementations further include identifying one or more articles of clothing worn by the respective person, executing at least one transformation that adjusts pixels of the sub-image such that the one or more articles of clothing depicted in the sub-image fit in a common template, calculating variance values between a plurality of transformed sub-images comprising the sub-image transformed by the at least one transformation and other sub-images generated for other persons in the plurality of persons and transformed by the at least one transformation, and generating a virtual model based on the variance values.
G06T 11/60 - Édition de figures et de texteCombinaison de figures ou de texte
G06T 3/40 - Changement d'échelle d’images complètes ou de parties d’image, p. ex. agrandissement ou rétrécissement
G06T 7/33 - Détermination des paramètres de transformation pour l'alignement des images, c.-à-d. recalage des images utilisant des procédés basés sur les caractéristiques
G06V 40/10 - Corps d’êtres humains ou d’animaux, p. ex. occupants de véhicules automobiles ou piétonsParties du corps, p. ex. mains
62.
METHODS AND APPARATUSES FOR DETERMINING TAG INFORMATION
Aspects of the present disclosure include methods, systems, and non-transitory computer readable media for receiving a plurality of reception magnetic signals, determining state information associated with each marker of the plurality of markers based on a corresponding transmission magnetic signal of the plurality of transmission magnetic signals and a corresponding reception magnetic signal of the plurality of reception magnetic signals, and determining tag information based on the state information of the plurality of markers.
G08B 13/24 - Déclenchement électrique par une interférence avec la distribution d'un champ électromagnétique
G01D 5/14 - Moyens mécaniques pour le transfert de la grandeur de sortie d'un organe sensibleMoyens pour convertir la grandeur de sortie d'un organe sensible en une autre variable, lorsque la forme ou la nature de l'organe sensible n'imposent pas un moyen de conversion déterminéTransducteurs non spécialement adaptés à une variable particulière utilisant des moyens électriques ou magnétiques influençant la valeur d'un courant ou d'une tension
G06K 19/06 - Supports d'enregistrement pour utilisation avec des machines et avec au moins une partie prévue pour supporter des marques numériques caractérisés par le genre de marque numérique, p. ex. forme, nature, code
G08B 27/00 - Systèmes d'alarme dans lesquels la condition déclenchant l'alarme est signalée par une station centrale à plusieurs sous-stations
63.
AUTO-CONFIGURING A REGION OF INTEREST (ROI) ASSOCIATED WITH A CAMERA
Disclosed herein are apparatuses and methods for auto-configuring a region of interest (ROI) associated with a camera. In one implementation, A method includes tracking, over a plurality of image frames spanning a first period of time, a plurality of objects moving in an environment, and determining a plurality of respective trajectories of the plurality of objects. The method includes identifying a common trajectory shared by more than one object of the plurality of objects based on comparing each of the plurality of respective trajectories to one another and identifying an ROI that encompasses the common trajectory. The method further includes tracking, over a plurality of new image frames spanning a second period of time, another plurality of objects moving in the environment, and generating an alert that the common trajectory has changed based on new trajectories of the another plurality of objects.
A security tag includes: an elongated inlay portion; an antenna mounted on the elongated inlay portion; and a radio frequency identification (RFID) circuit coupled with the antenna. The security tag may be encapsulated within an elongated textile protective sleeve. At least one of the elongated inlay portion, the antenna or the RFID circuit are adapted to dissolve in water.
G06K 19/073 - Dispositions particulières pour les circuits, p. ex. pour protéger le code d'identification dans la mémoire
G06K 19/077 - Détails de structure, p. ex. montage de circuits dans le support
A61F 13/42 - Garnitures absorbantes, p. ex. serviettes ou tampons hygiéniques pour application externe ou interne au corpsMoyens pour les maintenir en place ou les fixerApplicateurs de tampons avec un indicateur ou une alarme d'humidité
65.
METHOD AND SYSTEM FOR SELF-CHECKOUT IN A RETAIL ENVIRONMENT
The present disclosure relates to systems and methods for contactless checkout in a retail environment including a security pedestal located at an entrance or exit to a retail location. The system further includes a scanning device that is communicably coupled with the security pedestal. The self-checkout system and methods may also include a processing system that is configured to receive a list of items from the security pedestal and customer identification code from the scanning device. The system and method is configured to allow for a customer to scan his purchases at the security pedestal and pay for the purchases through the use of the customer identification code generated, preferably, using the customer's personal computing device.
A method for securing a security tag into an article of clothing includes positioning an end of the security tag into a first opening to an interface space between two layers of the article of clothing. The two layers are fixedly connected by one or more opposing connectors that are spaced apart in a manner to form the interface space sized to receive the security tag. The security tag is fully moved into the interface space. Also described herein is a security tag specially configured for placement into the interface space between two layers of the article of clothing.
Example aspects include techniques for reducing false alarms caused by stray tags. These techniques may include determining, by a processor of an EAS system, a chatter score of a RFID identification of a RFID tag that generated one or more RFID readings at one or more RFID readers, and selecting, by the processor of the EAS system, the RFID identification based at least in part on the chatter score being below a chatter score threshold. In addition, the techniques may include determining, by the processor of the EAS system, that the RFID identification corresponds to a RFID tag in motion, and triggering, by the processor of the EAS system, an alarm based on a determination that the RFID tag identified by the RFID identification is not authorized to leave a controlled area associated with the one or more RFID readers.
An electronic article surveillance (“EAS”) tag for an EAS system, comprising an antenna, a radio frequency identification (“RFID”) chip configured to transmit and/or receive a wireless signal via the antenna; and a magnetically-actuatable switch configured to move between a first position and a second position. The switch is configured to electrically couple the RFID chip to the antenna in the first position. The switch is further configured to electrically decouple the RFID chip from the antenna in the second position.
A flexible security tag includes: an elongated inlay portion; a loop antenna mounted on the elongated inlay portion; an electrically-conductive member longitudinally extending across the elongated inlay portion, spaced apart from and inductively coupled to the loop antenna; and a radio frequency identifier (RFID) circuit mounted to the loop antenna. The flexible security tag is encapsulated within an elongated textile protective sleeve.
A flexible security tag includes: an elongated inlay portion; a loop antenna mounted on the elongated inlay portion; an electrically-conductive member longitudinally extending across the elongated inlay portion, spaced apart from and inductively coupled to the loop antenna; and a radio frequency identifier (RFID) circuit mounted to the loop antenna. The flexible security tag is encapsulated within an elongated textile protective sleeve.
An electronic article surveillance tag with a tag body, a locking member, and unlocking member. The locking member is within the tag body and can receive and releasably engage with a pin portion of a connecting member and lock the connecting member to the tag body. The locking member includes a clutch mechanism movable between a first position in fixed engagement with the pin portion and corresponding to a locked state and a second position corresponding to an unlocked state that allows detachment of the pin portion from the locking member. The clutch mechanism further includes a plunger member formed from a non-ferromagnetic material. The unlocking member is fully encased within the tag body and movement of the unlocking member from a locked position to an unlocked position moves the clutch mechanism between the first position corresponding to the locked state and the second position corresponding to the unlocked state.
E05B 73/00 - Dispositifs de verrouillage pour objets portatifs empêchant un déplacement non autoriséDispositifs de verrouillage non prévus dans les autres groupes de la présente sous-classe
E05B 47/00 - Fonctionnement ou commande des serrures ou autres dispositifs d'immobilisation par des moyens électriques ou magnétiques
G08B 13/24 - Déclenchement électrique par une interférence avec la distribution d'un champ électromagnétique
A method for configuring a sensor tag may include providing a flexible substrate layer comprising a thin film of thermoplastic polyurethane (TPU); depositing a sensor inlay on the flexible substrate layer; and applying a protective coating over the sensor inlay encapsulating the sensor inlay between the flexible substrate layer and the protective coating.
G06K 19/02 - Supports d'enregistrement pour utilisation avec des machines et avec au moins une partie prévue pour supporter des marques numériques caractérisés par l'utilisation de matériaux spécifiés, p. ex. pour éviter l'usure pendant le transport à travers la machine
H01Q 1/22 - SupportsMoyens de montage par association structurale avec d'autres équipements ou objets
G06K 19/077 - Détails de structure, p. ex. montage de circuits dans le support
An antenna for providing light is disclosed. The antenna may comprise a substrate having at least two domains and a light source which is connected to two domains. The light source may emit light when a direct current flows from one domain to another domain. A radio frequency (RF) current flows through the domains for generation of radio waves. A capacitor is provided between adjacent domains to provide a path for the RF current to bypass the light source. The substrate is enabled to absorb the heat dissipated by the light source. The substrate is coated with a reflective material to reflect impinging light rays.
The present aspects include a magnetic detacher including a housing having a wall that defines a nest configured to receive a security tag; a gate member and an actuator configured to move the gate member between a closed position and an open position, wherein the gate member in the closed position blocks the nest, and in the open position allows access to the nest; a magnet positioned on an opposite side of the housing relative to the nest and adjacent to the nest, the magnet having a field in an area of the nest sufficient to unlock a magnetic lock of the security tag; and a processor in communication with the actuator and with a transaction system, wherein the processor is configured to control the actuator to move the gate member from the closed position to the open position based on receipt of an unlock signal from the transaction system.
E05B 73/00 - Dispositifs de verrouillage pour objets portatifs empêchant un déplacement non autoriséDispositifs de verrouillage non prévus dans les autres groupes de la présente sous-classe
77.
Detaching a security tag from an article with a magnetic detacher having a movable blocker
The present aspects include a method of detaching a security tag from an article, including receiving, at a detacher device, an unlock signal from a transaction system. The detacher device includes a housing having a nest configured to receive a security tag, a gate assembly including a gate member movable between a closed position that blocks the nest and an open position, and a magnet positioned on an opposite the nest and having a magnetic flux sufficient to unlock a magnetic lock of the security tag. The method further includes moving the gate member from the closed position to the open position based on receipt of the unlock signal, receiving the security tag in the nest, and unlocking the magnetic lock of the security tag to allow the security tag to be detached from the article.
E05B 73/00 - Dispositifs de verrouillage pour objets portatifs empêchant un déplacement non autoriséDispositifs de verrouillage non prévus dans les autres groupes de la présente sous-classe
G08B 13/19 - Déclenchement influencé par la chaleur, la lumière, ou les radiations de longueur d'onde plus courteDéclenchement par introduction de sources de chaleur, de lumière, ou de radiations de longueur d'onde plus courte utilisant des systèmes détecteurs de radiations passifs utilisant des systèmes détecteurs de radiations infrarouges
78.
DETACHING A SECURITY TAG FROM AN ARTICLE WITH A MAGNETIC DETACHER HAVING A MOVABLE BLOCKER
The present aspects include a method of detaching a security tag from an article, including receiving, at a detacher device, an unlock signal from a transaction system. The detacher device includes a housing having a nest configured to receive a security tag, a gate assembly including a gate member movable between a closed position that blocks the nest and an open position, and a magnet positioned on an opposite the nest and having a magnetic flux sufficient to unlock a magnetic lock of the security tag. The method further includes moving the gate member from the closed position to the open position based on receipt of the unlock signal, receiving the security tag in the nest, and unlocking the magnetic lock of the security tag to allow the security tag to be detached from the article.
G08B 13/24 - Déclenchement électrique par une interférence avec la distribution d'un champ électromagnétique
E05B 73/00 - Dispositifs de verrouillage pour objets portatifs empêchant un déplacement non autoriséDispositifs de verrouillage non prévus dans les autres groupes de la présente sous-classe
Example implementations include a system and method for providing a graphical user interface (GUI) on a display, wherein the GUI is operable for displaying a representation of a detection field of an object counting radar unit, wherein the GUI is operable for displaying a reference point that represents a rotatable object as detected by the object counting radar unit when the rotatable object is located in a field-of-view of the object counting radar unit and is rotated by a drive motor assembly.
Example implementations include a system and method for providing a graphical user interface (GUI) on a display, wherein the GUI is operable for displaying a representation of a detection field of an object counting radar unit, wherein the GUI is operable for displaying a reference point that represents a rotatable object as detected by the object counting radar unit when the rotatable object is located in a field-of-view of the object counting radar unit and is rotated by a drive motor assembly.
G08B 13/16 - Déclenchement par intervention de vibrations mécaniques dans l'air ou un autre fluide
G08B 13/196 - Déclenchement influencé par la chaleur, la lumière, ou les radiations de longueur d'onde plus courteDéclenchement par introduction de sources de chaleur, de lumière, ou de radiations de longueur d'onde plus courte utilisant des systèmes détecteurs de radiations passifs utilisant des systèmes de balayage et de comparaison d'image utilisant des caméras de télévision
G08B 13/24 - Déclenchement électrique par une interférence avec la distribution d'un champ électromagnétique
81.
Variable RFID transmit power adjustment based on surrounding environment to enhance tag detection field
A method for operating a sensor includes receiving identification information from one or more electronic identification devices (EIDs) located in a vicinity of the sensor. A number of EIDs located in the vicinity of the sensor is determined based on the received identification information. A determination is made if the number of EIDs located in the vicinity of the sensor exceeds a first predefined threshold. Transmission power to the sensor is selectively adjusted based on the number of EIDs with respect to the first predefined threshold, in response to determining that the number of EIDs located in the vicinity of the sensor exceeds or is less than any number of predefined thresholds.
G06K 7/10 - Méthodes ou dispositions pour la lecture de supports d'enregistrement par radiation électromagnétique, p. ex. lecture optiqueMéthodes ou dispositions pour la lecture de supports d'enregistrement par radiation corpusculaire
A method for operating a sensor includes receiving identification information from one or more electronic identification devices (EIDs) located in a vicinity of the sensor. A number of EIDs located in the vicinity of the sensor is determined based on the received identification information. A determination is made if the number of EIDs located in the vicinity of the sensor exceeds a first predefined threshold. Transmission power to the sensor is selectively adjusted based on the number of EIDs with respect to the first predefined threshold, in response to determining that the number of EIDs located in the vicinity of the sensor exceeds or is less than any number of predefined thresholds.
Systems and methods for coupling a tag to an item. The methods comprise: dispensing the tag from a tag feeder of a tag applicator; performing first operations by the tag applicator to mechanically move the tag into a nest of the tag applicator; determining if a given criteria is met based on feedback information received from at least one of a user of the tag applicator and a sensor provided with the tag applicator; and performing second operations by the tag applicator to couple the tag to the item, when a determination is made that the given criteria is met.
G08B 13/24 - Déclenchement électrique par une interférence avec la distribution d'un champ électromagnétique
E05B 73/00 - Dispositifs de verrouillage pour objets portatifs empêchant un déplacement non autoriséDispositifs de verrouillage non prévus dans les autres groupes de la présente sous-classe
F16B 21/00 - Dispositifs sans filetage pour empêcher le mouvement relatif selon l'axe d'une broche, d'un ergot, d'un arbre ou d'une pièce analogue par rapport à l'organe qui l'entoureFixations à ergots et douilles largables sans filetage
G06Q 10/087 - Gestion d’inventaires ou de stocks, p. ex. exécution des commandes, approvisionnement ou régularisation par rapport aux commandes
B62H 5/00 - Accessoires empêchant ou signalant l'emploi non autorisé ou le vol des cyclesDispositifs de verrouillage (antivols) faisant corps avec les cycles
84.
SYSTEM AND METHOD FOR FOIL DETECTION USING MILLIMETER WAVE FOR RETAIL APPLICATIONS
In an aspect, the present disclosure includes a system for detecting metal foil using millimeter wave (mmWave) for retail applications. The system comprises one or more pedestals positioned to define an exit portal leading to a point of exit, one or more security tag readers, fixedly positioned with the one or more pedestals, configured to read data from a security tag passing through the exit portal and one or more mmWave receivers, fixedly positioned near the point of exit, configured to receive one or more reflected mmWave beams from metal foil, wherein the detection of metal foil results in an alert message.
Systems and methods for operating a marker that involve receiving, by a Radio Frequency Identification (“RFID”) element of the marker, an RFID deactivation signal; and responsive to the RFID deactivation signal, supplying power to a detuner element of the marker so that the detuner element switches from a first state to a second state. The marker's resonant frequency is changed to a first value that falls outside of an Electronic Article Surveillance (“EAS”) systems operating frequency range when the detuner element switches from the first state to the second state.
An EAS system first transmits a radio frequency identification (RFID) interrogation signal into an RFID interrogation zone of an EAS system. The system then first receives at least one RFID response signal from a first RFID tag of the system responding to the interrogation signal. The system second transmits a non-RFID RF signal into a second zone. The second zone and the RFID interrogation zone overlap to form a zone of interest. The system second receives, from the first RFID tag, an indication that the first RFID tag received the second transmission. The system determines, based on receiving both the RFID response signal from a first RFID tag and the indication that the first RFID tag received the second transmission, that the first RFID tag is in the zone of interest.
H04W 4/80 - Services utilisant la communication de courte portée, p. ex. la communication en champ proche, l'identification par radiofréquence ou la communication à faible consommation d’énergie
G06K 7/10 - Méthodes ou dispositions pour la lecture de supports d'enregistrement par radiation électromagnétique, p. ex. lecture optiqueMéthodes ou dispositions pour la lecture de supports d'enregistrement par radiation corpusculaire
G06K 19/07 - Supports d'enregistrement avec des marques conductrices, des circuits imprimés ou des éléments de circuit à semi-conducteurs, p. ex. cartes d'identité ou cartes de crédit avec des puces à circuit intégré
G08B 13/24 - Déclenchement électrique par une interférence avec la distribution d'un champ électromagnétique
Example implementations include a method, apparatus and computer-readable medium of computer vision configured for person classification, comprising receiving, during a first period of time, a plurality of image frames of an environment, identifying images of persons from each frame of the plurality of image frames, and determining a respective vector representation of each of the images. The implementations include generating a probability distribution indicative of a likelihood of a particular vector representation appearing in the plurality of image frames and identifying an associate vector representation by sampling the probability distribution using a probability model. The implementations include determining an input vector representation of an input image identified in an image frame depicting a person and received during a second period of time. The implementations include comparing the input vector representation with the associate vector representation and classifying, based on the comparison, the person in the input image as an associate.
Example implementations include a method, apparatus and computer-readable medium of computer vision configured for person classification, comprising receiving, during a first period of time, a plurality of image frames of an environment, identifying images of persons from each frame of the plurality of image frames, and determining a respective vector representation of each of the images. The implementations include generating a probability distribution indicative of a likelihood of a particular vector representation appearing in the plurality of image frames and identifying an associate vector representation by sampling the probability distribution using a probability model. The implementations include determining an input vector representation of an input image identified in an image frame depicting a person and received during a second period of time. The implementations include comparing the input vector representation with the associate vector representation and classifying, based on the comparison, the person in the input image as an associate.
G06V 20/52 - Activités de surveillance ou de suivi, p. ex. pour la reconnaissance d’objets suspects
G06V 10/764 - Dispositions pour la reconnaissance ou la compréhension d’images ou de vidéos utilisant la reconnaissance de formes ou l’apprentissage automatique utilisant la classification, p. ex. des objets vidéo
G06V 40/10 - Corps d’êtres humains ou d’animaux, p. ex. occupants de véhicules automobiles ou piétonsParties du corps, p. ex. mains
G06V 40/20 - Mouvements ou comportement, p. ex. reconnaissance des gestes
H04N 7/18 - Systèmes de télévision en circuit fermé [CCTV], c.-à-d. systèmes dans lesquels le signal vidéo n'est pas diffusé
An RFID portal of an EAS system first interrogates a first zone extending into a controlled area beyond a threshold distance from an interrogating antenna of the portal. The portal defines an exit from the controlled area, the threshold distance being less than a width of the exit. The portal first detects, in response to the first interrogating, a first response of a particular RFID tag. The portal second interrogate, subsequent to the first detecting, in a second zone extending into the controlled area at least to the threshold distance. The portal second detects, in response to the second interrogating, at least one second response of the particular RFID tag indicating a received signal strength of the second interrogating at the particular RFID tag corresponding to a distance from an interrogating antenna of the portal less than the threshold distance. The EAS system alarms in response to the second detecting.
Techniques for distinguishing objects (e.g., an individual or an individual pushing a shopping cart) are disclosed. An object is detected in images of a scene. A height map is generated from the images, and the object is represented as height values in the height map. Based on height properties associated with another object, it is determined whether the other object is associated with the object. If so determined, the objects are classified separately.
G06F 16/58 - Recherche caractérisée par l’utilisation de métadonnées, p. ex. de métadonnées ne provenant pas du contenu ou de métadonnées générées manuellement
G06T 7/187 - DécoupageDétection de bords impliquant des croissances de zonesDécoupageDétection de bords impliquant des fusions de zonesDécoupageDétection de bords impliquant un étiquetage de composantes connexes
G06V 20/52 - Activités de surveillance ou de suivi, p. ex. pour la reconnaissance d’objets suspects
G06V 40/20 - Mouvements ou comportement, p. ex. reconnaissance des gestes
G07C 9/00 - Enregistrement de l’entrée ou de la sortie d'une entité isolée
G07C 9/28 - Enregistrement de l’entrée ou de la sortie d'une entité isolée comportant l’utilisation d’un laissez-passer le laissez-passer permettant le repérage ou signalant la présence
93.
Systems and methods for laser tuning and attaching RFID tags to products
Aspects of the present disclosure relate to methods and systems for laser turning and attaching RFID tags to products. Such methods and systems may include a memory and a processor coupled to the memory. The methods and systems may include determining a characteristic of a conductive trace on a substrate to be incorporated into an item to configure a tag performance in view of at least one of a dielectric property or a tuning property of the item. The methods and systems may further include a laser to alter the conductive trace on the substrate to have the characteristic to define an antenna for the tag. The methods and systems may further include an attaching device configured to attach a communications enabled device to the substrate so as to form an electrical connection between the communications enabled device and the antenna to form the tag.
G06K 19/07 - Supports d'enregistrement avec des marques conductrices, des circuits imprimés ou des éléments de circuit à semi-conducteurs, p. ex. cartes d'identité ou cartes de crédit avec des puces à circuit intégré
G06K 19/077 - Détails de structure, p. ex. montage de circuits dans le support
The present disclosure relates to a system for determining anomalous behavior. The system comprises a processing device that is configured to generate first segmentation information and second segmentation information from the video feed, the first segmentation information corresponding to a first potential occupant and the second segmentation information corresponding to a second potential occupant. The processing device further configured to determine that the first segmentation information and the second segmentation information correspond to actual occupants based on the first segmentation information and the second segmentation information, and generate a first bounding box associated with the first segmentation information and a second bounding box associated with the second segmentation information. The processing device further configured to determine an intersection over union (IOU) region for the first bounding box and the second bounding box, identify anomalous behavior based on the IOU region, and generate one or more alerts identifying the anomalous behavior.
G06V 10/764 - Dispositions pour la reconnaissance ou la compréhension d’images ou de vidéos utilisant la reconnaissance de formes ou l’apprentissage automatique utilisant la classification, p. ex. des objets vidéo
G06V 20/40 - ScènesÉléments spécifiques à la scène dans le contenu vidéo
G06V 40/20 - Mouvements ou comportement, p. ex. reconnaissance des gestes
97.
Magnetically-locking retractable tag with anti-defeat impact protection
Systems and methods for operating a security tag. The methods comprise: causing a plunger of the security tag to engage a latch of the security tag; preventing, by an anti-defeat structure of the security tag, a disengagement between the plunger and the latch when an impact force is applied to the security tag; and allowing, by the anti-defeat structure, the plunger to disengage the latch when a magnetic field is applied to the security tag.
E05B 73/00 - Dispositifs de verrouillage pour objets portatifs empêchant un déplacement non autoriséDispositifs de verrouillage non prévus dans les autres groupes de la présente sous-classe
E05B 17/20 - Moyens indépendants du mécanisme de verrouillage pour empêcher une ouverture non autorisée, p. ex. pour bloquer le pêne en position de fermeture
98.
SYSTEMS AND METHODS FOR OBJECT DETECTION IN AN ENVIRONMENT
Aspects of the present disclosure relate generally to a vision system that detects persons exiting an environment, comprising detecting, by a processor using a plurality of image frames from at least one sensor, persons that exited the environment during a first period of time. The vision system further determines, by the processor, an exit count for the first period of time and retrieves, from a database, historical egress data comprising a detected historic exit count and a corrected historic exit count of the environment for a second period of time corresponding to the first period of time. The vision system calculates an error rate for the second period of time based on a ratio of the detected historic exit count and the corrected historic exit count, determines and stores a corrected exit count for the first period of time by adjusting the exit count using the error rate.
G06V 20/52 - Activités de surveillance ou de suivi, p. ex. pour la reconnaissance d’objets suspects
G06V 10/98 - Détection ou correction d’erreurs, p. ex. en effectuant une deuxième exploration du motif ou par intervention humaineÉvaluation de la qualité des motifs acquis
G06V 40/10 - Corps d’êtres humains ou d’animaux, p. ex. occupants de véhicules automobiles ou piétonsParties du corps, p. ex. mains
99.
Systems and methods for object detection in an environment
Aspects of the present disclosure relate generally to a vision system that detects persons exiting an environment, comprising detecting, by a processor using a plurality of image frames from at least one sensor, persons that exited the environment during a first period of time. The vision system further determines, by the processor, an exit count for the first period of time and retrieves, from a database, historical egress data comprising a detected historic exit count and a corrected historic exit count of the environment for a second period of time corresponding to the first period of time. The vision system calculates an error rate for the second period of time based on a ratio of the detected historic exit count and the corrected historic exit count, determines and stores a corrected exit count for the first period of time by adjusting the exit count using the error rate.
A method for securing a security tag into an article of clothing includes positioning an end of the security tag into a first opening to an interface space between two layers of the article of clothing. The two layers are fixedly connected by one or more opposing connectors that are spaced apart in a manner to form the interface space sized to receive the security tag. The security tag is fully moved into the interface space. Also described herein is a security tag specially configured for placement into the interface space between two layers of the article of clothing.