SENSORMATIC ELECTRONICS, LLC Patent applications |
Patent application number | Title | Published |
20160094559 | Auto Configuration For Auto-Enrolled Access Controller Systems - Disclosed is a system for a facility supporting an access controller, at least one ingress card reader and an auto-enrollment type controller including a front panel having a single button, a controller board, a terminal block for connecting at least the one ingress card reader to the auto-enrollment type controller board and to connect the auto-enrollment type controller to door locks, and a mounting plate, with the auto-enrollment type controller being configured by a user according to operational requirements of the facility by the user asserting the button for a defined period of time. | 03-31-2016 |
20160093176 | Residential Security Using Game Platform - A security system includes sensor devices, a security panel that receives signals from the sensor devices and that executes algorithms to determine the presence of an alarm that is sent to a game console coupled to a monitor. The game console includes a processor and memory, a graphics processor, and a network interface that receives data from the security panel and causes a message regarding the alarm condition to be displayed on the monitor. | 03-31-2016 |
20160043544 | Lightning and Surge Protection For Electronic Circuits - Lighting and surge protection circuitry for protection of a differential pair includes a diode bridge circuit having a first pair and a second pair of connections to the diode bridge circuit, with the first pair of connections configured to be coupled to a pair of differential inputs of a functional circuit and a first diode coupled between the second pair of connections; and second and third diodes coupled between the first pair of connections and ground. The lighting and surge protection circuitry also includes a diode pair coupled between an output of the functional circuit being protected and power and ground terminals and a small resistance in series with the output of the functional circuit. | 02-11-2016 |
20150348220 | METHOD AND SYSTEM FOR MANAGING EVACUATIONS USING POSITIONING SYSTEMS - In a system and method for managing evacuations of buildings, in response to detection of a fire, a control panel initiates an alarm condition and activates annunciation devices to signal that an evacuation of the building is required. A positioning and evacuation system tracks locations of occupants in the building and the progression of the fire. The positioning and evacuation system generates individualized evacuation paths for the occupants, which are transmitted to and displayed on mobile computing devices of the occupants. Additionally, the positioning and evacuation system generates turn by turn directions of the individualized evacuation paths, which are displayed on three dimensional maps or with augmented reality on the mobile computing devices of the occupants. | 12-03-2015 |
20150215586 | Selection and Display of Adaptive Rate Streams in Video Security System - Selection and display of adaptive rate video streams in a video security system in which user devices such as mobile computing devices mix and display multiple streams concurrently from security cameras on the user devices. A client application running on the user devices determines available buffer resources on the user devices, and enables selection of one or more video streams from a grid displayed on a display of the user devices. In response to the determined resources, the client application obtains higher bit rate video streams for the selected video streams and lower bit rate video streams for the non-selected video streams. The client application then displays the higher bit rate streams in visually distinct focus panes that attract the attention of an operator and displays the lower bit rate streams in less visually distinct periphery panes. In a preferred embodiment, operators can select a stream from the periphery panes to display as higher bit rate stream in a focus pane. | 07-30-2015 |
20150049190 | System and Method for Video/Audio and Event Dispatch Using Positioning System - A system and method for operating a network security system implementing security cameras, motion sensors, access control systems, security door locks, and mobile panic button devices within a monitored area. Security cameras transmit video to a network video recorder and the video is analyzed by a video analytics system to determine if a security event is occurring. If a security event occurs, a security control system calls a dispatch service, which transmits a notification to only those security guards who are within a given area of the event. | 02-19-2015 |
20140325627 | AUTHENTICATION SYSTEM AND METHOD FOR EMBEDDED APPLETS - A system and method for authenticating user requests issued from embedded applets running on web-accessible user devices. The server system generates authentication tokens associated with user credentials, in response to user requests for HTML pages that include the embedded applets. The server system stores the authentication tokens on the server system, and includes the authentication tokens in URLs within applet tags in the HTML pages returned to the user devices. When the applets download and request content from the server system, the applets supply the previously included authentication tokens in the URLs that identify the requested content. Upon finding a match between the applet-supplied authentication tokens and the stored authentication tokens, the server identifies the user as a trusted user, and responds with the requested content. This can be used to eliminate HTTP- based authentication challenges for subsequent user access. | 10-30-2014 |
20140305747 | Access Control System for Override Elevator Control and Method Therefor - A system and method for an access control system for an elevator system that overrides landing matrices that define the access to the floors in the elevator system. The system overrides the landing matrices of the access control system in response to conditions defined by security system operators, such as emergency situations, and sends the landing matrices to elevator controllers for controlling the access to the floors. In examples, the system supports configuration of vendor-neutral landing matrix objects sent to the access control system over a security network for creating new landing matrices, and overriding the contents of the existing landing matrices. | 10-16-2014 |
20140289797 | Networked Security System with Translating Router - A system and method for protocol translation between security devices in a security network using a transforming router. The router utilizes protocol templates to identify the protocols that encapsulate messages sent by the devices, and to determine the format of the messages. Using the protocol templates, the router translates the messages from protocols of source security devices to an intermediate protocol, translates the messages in the intermediate protocol into destination protocols for destination security devices, and forwards the messages to the destination security devices. | 09-25-2014 |
20140247362 | Method and System to Characterize Video Background Changes as Abandoned or Removed Objects - A method and system for analyzing video data in a security system. An analysis compares a current frame to a background model. The analysis system compares the background model to the current frame to identify changed pixel patches. The analysis system uses morphological image processing to generate masks based on the changed pixel patches. Next, the analysis system applies the masks to the background model and the current frames to determine whether the changed pixel patches are characteristic of abandoned or removed objects within the video data. | 09-04-2014 |
20140232860 | Method and System for Assisting Security Camera Focusing - A system and method for installing security cameras on a security network of a security system. The security cameras include an autofocus routine, manually adjustable lenses, and feedback mechanisms. The autofocus routine calculates the degree to which the field of view is out of focus and the feedback mechanism provides feedback to the installer during installation. In response to the feedback from the feedback mechanism, the installer manually adjusts the lens of security camera. | 08-21-2014 |
20140232531 | SECURITY TAG DETACHER ACTIVATION SYSTEM - A detacher for unlocking a security tag having a locking mechanism is provided. The detacher includes a detaching element in which the detaching element is configured to unlock the locking mechanism if the detaching element is activated. The detacher includes a reader in which the reader is configured to receive a user identifier associated with at least one user. The detacher includes a memory. The memory is configured to store at least one user rule. The detacher includes a processor in which the processor is configured to determine whether the received user identifier meets the at least one user rule. The processor is further configured activate the detaching element if the received user identifier meets the at least one user rule. The detaching element remains deactivated if the received user identifier does not meet the at least one user rule. | 08-21-2014 |
20140232530 | TAG DETACHER WITH HAPTIC FEEDBACK - An electronic article surveillance (“EAS”) system tag detacher for unlocking an EAS tag is provided. The EAS tag includes a housing and a locking mechanism disposed within the housing. The EAS system tag detacher includes an EAS tag receiving area configured to receive the EAS tag. The EAS system tag detacher further includes a detaching element configured to unlock the EAS tag; and a haptic feedback element. The haptic feedback element is configured to generate haptic feedback when energized, the haptic feedback element being energized when the EAS tag has been unlocked by the detaching element. | 08-21-2014 |
20140218164 | Configuration of Security Devices Using Spatially-Encoded Optical Machine-Readable Indicia - A method and system for configuring security devices on a security network. A mobile computing device reads spatially-encoded optical machine-readable indicia, decodes the indicia, and extracts encoded configuration information for the security devices. The configuration information from the indicia is then transmitted to a monitoring station, which uses the configuration information to configure communication with the security devices on the security network. | 08-07-2014 |
20140208559 | DYNAMIC MAGNETIC DETACHER - A system is provided. The system includes a detacher. The detacher includes a field source. The field source is arranged to provide a first magnetic field when power is applied to the field source. The detacher further includes a magnet arranged to provide a second magnetic field. The magnet is movable from a non-detach position to a detach position when exposed to the first magnetic field. The second magnetic field is arranged to unlock a security tag when the magnet is at the detach location. The system further includes an activation device. The activation device includes a processor configured to trigger power to be supplied to the field source. | 07-31-2014 |
20140203936 | PORTABLE DEACTIVATOR FOR SECURTY TAG DEACTIVATION - A portable deactivator having a corresponding identifier is provided. Identification data associated with a user is captured by the portable deactivator. A determination is made whether to activate a deactivation element in the portable deactivator based at least in part on the captured user identification data. The deactivation element is configured to disable at least one electronic article surveillance, EAS, tag when the deactivation element is activated. The deactivation element remains disabled when the determination is made the user associated with the captured identification data is unauthorized to use the deactivator. | 07-24-2014 |
20140199572 | FILM-BASED BATTERY HOLDER - A battery pack is provided. The battery pack includes a first battery that includes a first terminal and second terminal on the opposite side of the battery from the first terminal. The battery pack further includes a battery holder. The battery holder includes a flexible substrate and a first conductive element disposed on the flexible substrate. The first conductive element has a first contact region to electrically engage with the first terminal. The battery holder further includes a second conductive element that has a second contact region to electrically engage with the second terminal when the flexible substrate is folded over the first battery. | 07-17-2014 |
20140197959 | Security System and Method with Multistate Alert User Interface - A security system, system user interface, and method for displaying status information from security devices in a networked security system using a multistate alert user interface. The security system supports different features in icons associated with the security devices, displayed on a graphical user interface. This provides operators with the ability to display status information from security devices, such as alert information comprising one or more alerts, by displaying the icons on a topology map of the graphical user interface. In this way, the operator can determine at a glance the number and type of alert information from the topology map without the need to perform additional selection and navigation steps within the graphical user interface. | 07-17-2014 |
20140167503 | INTELLIGENT ADAPTIVE POWER SUPPLY - A multi-output power supply comprises an input power port for receiving input power, a first output power port supplying a first voltage derived from the input power, a second output power port supplying a second voltage derived from the input power, and a shut-down circuit configured to shut down the first output power port, independently of the second output power port, if power drawn from the first output power port exceeds a first predetermined value. | 06-19-2014 |
20140160293 | Security Video System Using Customer Regions for Monitoring Point of Sale Areas - A system and method for determining proximity of individuals to specific regions of interest such as Point of Sale (“POS”) terminals within a POS monitored area of a scene of video data captured from security cameras as part of a networked security system, when the security cameras are located outside the POS monitored area, mounted on a ceiling or other high location and pointed at the POS monitored area. With the help of customer regions drawn in an abstract layer whose areas coincide with expected locations of individuals near POS terminals in the video data, and video analytics elements such as bounding boxes generated around individuals in the video data, the system can perform live and forensic analysis of the video data to infer information such as the proximity of individuals to POS terminals and the relative height of an individual compared to their expected height within the scene of video data. | 06-12-2014 |
20140159901 | ELECTRONIC ARTICLE SURVEILLANCE TAG DEACTIVATION - A method and system for producing an electromagnetic field that exhibits a strong near field that is sufficient to deactivate an electronic article surveillance, EAS, tag and a weak far field that is insufficient to deactivate the EAS tag are disclosed. According to one embodiment, two half-wavelength dipoles spaced apart by about a half-wavelength are excited by oppositely phased signals. | 06-12-2014 |
20140125800 | ELECTRONIC ARTICLE SURVEILLANCE TAGGED ITEM VALIDATION PRIOR TO DEACTIVATION - A method and system for activating an EAS element deactivator is provided. At a computer, item data including a physical attribute of an item is received. A determination is made as to whether the item data corresponds to a purchased item in a purchase receipt. When it is determined that the item data corresponds to the purchased item, EAS element deactivator is activated for use. | 05-08-2014 |
20140118541 | TRANSCODING MIXING AND DISTRIBUTION SYSTEM AND METHOD FOR A VIDEO SECURITY SYSTEM - A system and method for transcoding and mixing of video data in a security video distribution system for a video security system in response to selection of video data. User devices such as mobile user devices can select displayed video data streams sent from the video security system and create new views of the selected video data streams without the prior steps of configuring and pushing new views from a server within the system. At the time of selection, user devices can specify operations to perform on the selected video data, such as zoom and combine. In a preferred embodiment, transcoding and mixing of video data streams within the security video distribution system utilizes shared memory between processes. This has advantages not only in equipment cost savings and efficiency, but also provides for real-time collaboration and sharing of video content in a video security system using mobile user devices, a benefit for law enforcement and first responders. | 05-01-2014 |
20140118540 | SECURITY CAMERA SYSTEM AND METHOD FOR ELIMINATING VIDEO ABERRATIONS FROM EXCESSIVE IR ILLUMINATION - In a security camera system, the power to the illumination system is controlled based on the quality of the images generated by the imaging system. Specifically, the images in the frames detected by the imaging chip of the security camera are analyzed to determine whether or not there is adequate or inadequate power to the illumination system. The controller then changes the power to the illumination system until optimal illumination of the scene is achieved. Generally the power to the illumination system is reduced in response to increasing blur in the images or halos around edges in the images. | 05-01-2014 |
20140098233 | Access Control Reader with Audio Spatial Filtering - An access control reader enhances audio data captured by a beamforming microphone array. The access control reader determines a direction to a user and then utilizes beamforming in the direction of the user to enhance the user's voice. The user's enhanced voice is then transmitted to security personnel or a control system to validate the user's identity, in one example. | 04-10-2014 |
20140076969 | Access Control Reader Enabling Remote Applications - A system and method for enabling users to run remote applications on access control readers located throughout office buildings. A system administrator creates different remote applications groups such as admin, engineer or cardholder and then assigns users to one of the remote application groups. Users are then able to run the remote applications assigned to their remote application group from any of the access control readers located throughout the office building. | 03-20-2014 |
20140062728 | SYSTEM AND METHOD FOR DETECTING MOVEMENT OF A TAGGED ARTICLE - A system for determining motion of a tagged article may include a tag detection sub-system, a traffic pattern determination sub-system, and a monitoring sub-system. The tag detection sub-system is configured to output tag data regarding movement of the tagged article with respect to a tag detector proximate an exit portal of a location. The traffic pattern determination sub-system is configured to output traffic data regarding movement of an individual with respect to the exit portal of the location. The monitoring sub-system may include a correlation module configured to compare the tag data with the traffic data to accurately determine one or both of motion or path of the tagged article. | 03-06-2014 |
20140055608 | Method and System for Detecting and Clearing Camera Bubble Misting - A security camera system detects misting within the transparent portion of the security camera system by analyzing the actual images that are captured by the security camera system in order to determine whether or not there is misting on the transparent portion. Specifically, video analytics are applied to detect areas of the scene that appear to be out of focus as a result of misting of the transparent portion of the security camera system, also known as the bubble. The system uses, in a preferred embodiment, an edge-detection algorithm to look for areas of the scene that appear to have gone out of focus. When these are detected, the condensation mitigation system is activated in order to remove any misting. | 02-27-2014 |
20140002649 | METHOD AND SYSTEM FOR SECURITY SYSTEM TAMPERING DETECTION | 01-02-2014 |
20130342688 | Security System and Method using Wireless Adapters and PoE Cameras - A wireless adapter and method for providing a wireless connection to at least one wired security device includes at least one combined data/power physical port to which the wired security device connects. A power supply module receives power from an external power source and a power injector provides power to the combined data/power physical port to thereby power the wired security device. In this way, the wireless adapter supplies both power and data connection at the same physical port/jack of the wired security devices, such as IP security cameras, via an interface cable from the wireless adapter. This configuration has advantages in lowering the manufacturing costs of the cameras and reducing installation costs. Furthermore, the same standard camera can be used for both standard wired connections and wireless connections. | 12-26-2013 |
20130300822 | VIDEO USER INTERFACE SYSTEM AND METHOD - A system providing a graphical user interface incorporating fisheye image data captured by a first camera using a fisheye lens is provided. The system includes a buffer configured to receive the fisheye image data corresponding to a monitored area. A processor is in communication with the buffer. The fisheye image data is transformed into panoramic view data corresponding to a panoramic view of the monitored area using a panoramic transformation process. The fisheye image data is transformed into virtual view data corresponding to a partial view of the panoramic view using a virtual view transformation process different from the panoramic view transformation process. The panoramic view data and the virtual view data are encoded for display in the graphical user interface. | 11-14-2013 |
20130254304 | CUSTOMER ASSISTANCE REQUEST SYSTEM USING SMART DEVICE - A method and computer for responding to an assistance request message. An assistance request message from a requester mobile device associated with a requester is received at a response computer. The assistance request message includes at least one input parameter. A responder is determined, from multiple potential responders, to respond to the assistance request message. The responder is associated with responder data corresponding to the at least one input parameter. An availability inquiry message to a responder device associated with the responder is transmitted. A response to the availability inquiry message is received from the responder device. When the response to the availability inquiry message indicates that the responder is available to respond to the assistance request message, the requester mobile device is notified that the responder is available. | 09-26-2013 |
20130243038 | SCALABLE PROTOCOL FOR LARGE WSNS HAVING LOW DUTY CYCLE END NODES - A method and system are described for providing a wireless sensor network between a main node and a plurality of nodes, the nodes associated with sensors. The method and system define communications channels over which the main node communicates with the nodes based on a channel hopping scheme, and define at least one transfer channel that is dedicated to carrying transfer frames that are broadcast by the main node. The method and system configure non-acquired nodes that are not acquired to the network to enter a connection session by locating the at least one transfer channel to listen for a transfer message. The transfer message indicates a next communications channel that will become active. The method switches the non-acquired nodes to the next communications channel. | 09-19-2013 |
20130242905 | SCALABLE PROTOCOL FOR LARGE WSNS HAVING LOW DUTY CYCLE END NODES - A method and system are described for providing a wireless sensor network between a main node and a plurality of nodes, the nodes associate with sensors. The method and system define communications channels over which the main node communicates with the nodes based on a channel hopping scheme pattern, and define at least one transfer channel that is dedicated to carrying transfer frames that are broadcast by the main node. The method and system configure non-attached nodes that are not attached to the network, to enter a connection session by tuning to the transfer channel to listen for a transfer message. The transfer message indicates a next communications channel. The method tunes the non-attached nodes to the next communications channel, listens for a beacon frame, and utilizes the beacon frame as a timing reference to enable the non-attached nodes to attach to the network. | 09-19-2013 |
20130201338 | Method and System for Monitoring Portal to Detect Entry and Exit - A video monitoring and analysis system detect subjects when they are entering and/or exiting from a room. The system enables a user to define a portal, such as doorway of the room. The system then monitors the movement of foreground objects in the room. Objects that appear only in the portal are classified as passing by the portal, e.g., doorway. Objects that initially appear in the portal and then are detected moving within the room are classified as having entered the room. Objects that are in the room and then disappear within the portal are classified as having exited the room. The system further has provisions for generating real-time alerts and performing forensic searches. | 08-08-2013 |
20130146668 | RADIO FREQUENCY ID TAG HAVING STRUCTURE FOR INLAY SPACING - A radio frequency identification, RFID, security system tag is provided. The tag includes an RFID element and a first housing portion. The first housing portion defines an interior and an opening. The interior of the first housing portion includes an inner periphery and a shelf disposed about at least a portion of the inner periphery. The interior of the first housing portion also includes a plurality of protrusions in which the plurality of protrusions extend outwardly from the shelf toward the opening. The RFID element is disposed at least in part on the plurality of protrusions. | 06-13-2013 |
20130144757 | INVENTORY MANAGEMENT SYSTEM - Methods, systems, and articles of manufacture consistent with certain aspects related to the present invention collect item information from RFID tags attached to items in an inventory, and uses the collected item information to perform various inventory management processes. In one aspect, the inventory management processes may include determining, reporting, and/or providing corrective actions for one or more events associated with at least one of depletions of items in the inventory, changes in the design of items in the inventory, defects with one or more items, misplaced items, the movement of an unusual number of items within a short period of time (i.e., shrinkage), and malfunctions of one or more components included in the environment. | 06-06-2013 |
20130141242 | SECURITY TAG HAVING MAGNETICALLY RELEASABLE LATCH - A security system including a security tag is provided. The security tag includes a housing and a pin in which the pin is removably insertable into the housing. The security tag further includes a latching element disposed within the housing and positionable in a lock position and in an unlock position. The latching element includes a pivot axis. The latching element has a substantially balanced rotational response about the pivot axis when exposed to an external physical mechanical impulse. The security tag further includes a bias element that releasably positions the latching element in the lock position. The latching element releasably engages the inserted pin when in the lock position. | 06-06-2013 |
20130093591 | METHOD OF ASSIGNING AND DEDUCING THE LOCATION OF ARTICLES DETECTED BY MULTIPLE RFID ANTENNAE - In accordance with preferred embodiments of the invention, a method (and corresponding apparatus) is provided for deducing the location of one or more items or objects to be monitored. In exemplary embodiments, the method (and corresponding apparatus) is implemented in RFID (radio frequency identification) applications (e.g., reading RFID tags at 13.56 MHz and approximately 900 MHz) by deducing the location of an item associated with a unique RFID tag in one or more areas of detection covered by multiple RFID reader antennae. | 04-18-2013 |
20130082839 | SYSTEM AND METHOD FOR WIRELESS HEAT DETECTION - A system for wireless heat detection is disclosed. The system includes one or more heat sensors that convert sensed heat energy into electrical power for transmitting an alarm signals. A remote system may trigger an alarm based on the received alarm signals. The heat sensors may be placed at discrete locations within an interior of a building to monitor a condition of the infrastructure of the building. The remote system can include a communications module for receiving the signal and transmitting an alarm signal to an associated fire panel. The fire panel may analyze the signal, as well as signals generated from adjacent sensors, to determine whether a fire condition exists within a building. Appropriate notification devices may then be activated based on the determination. Other embodiments are disclosed and claimed. | 04-04-2013 |
20130048721 | PRODUCT INFORMATION SYSTEM AND METHOD USING A TAG AND MOBILE DEVICE - A product information system including a server having an item database that stores at least one item identifier and corresponding item data for at least one item. Also, the item database is associated with a predetermined vendor. The server also includes a receiver that receives a message including tag data captured from a tag by a portable wireless device. The tag data includes an item identifier. Also, the server includes a processor that operates, in response to the received message, to select item data from the item database that corresponds to the received item identifier. The server also includes a transmitter that transmits the selected item data to the portable wireless device. | 02-28-2013 |
20130036780 | MAGNETICALLY RELEASABLE SECURITY TAG - A security tag is provided that includes a housing, an electronic sensor held within the housing, an accessory pin provided with the housing and a lock assembly held within the housing. The accessory is pin provided with the tag housing and may be moveable with respect to the housing between locked and unlocked positions. When the accessory pin is in the locked position, the tag housing is secured to the accessory. When the accessory pin is in the unlocked position, the tag housing is disengaged from the accessory. The lock assembly may include a magnetically influenced (MI) member which is movable from a biased position to a relaxed position in the absence of the selected magnetic field to lock the accessory pins. | 02-14-2013 |
20130015355 | METHOD AND SYSTEM FOR PEOPLE COUNTING USING PASSIVE INFRARED DETECTORSAANM NOONE; David R.AACI Delray BeachAAST FLAACO USAAGP NOONE; David R. Delray Beach FL USAANM BERGMAN; Adam S.AACI Boca RatonAAST FLAACO USAAGP BERGMAN; Adam S. Boca Raton FL USAANM LYNCH; Robert KevinAACI GreenacresAAST FLAACO USAAGP LYNCH; Robert Kevin Greenacres FL US - A method and system for detecting an object transiting an interrogation zone of an electronic article surveillance (“EAS”) system and determining whether the object is a person entering or exiting the facility in order to increment a corresponding counter. A first zone detector detects motion in a first zone. The first zone detector can be a first passive infrared (“PIR”) detector. A second zone detector detects motion in a second zone different from the first zone. The second zone detector can be a second PIR detector. A processor is in communication with the first and second zone detectors in which the processor receives data from the first and second zone detectors to determine whether to increment a count value based at least in part on the received data. | 01-17-2013 |
20120326871 | SECURITY SYSTEM TAG MAGNETIC CLUTCH AND METHOD - A tag having a magnetic clamp for use in securing an item in order to prevent the unauthorized removal of the item from, for example, a retail store. The magnetic tag includes an attachment element that secures the item to the tag. A clamp having a locking region secures the attachment element such that the item cannot be separated from the tag. A keyed magnetic element on the clamp includes one or more hard magnets, where each hard magnet has either an outward-facing north or south polarity. By applying a magnetic force to the magnets, the locking region moves away from the attachment element thus allowing the item to be removed from the tag. The arrangement of magnets operates as a “key” and only a detacher unit with an identical magnetic pattern can apply the requisite magnetic force to the magnets to disengage the clamp from the attachment element to allow removal of the tag from the item. | 12-27-2012 |
20120326849 | ELECTRONIC PRICE LABEL SYSTEM AND METHOD - A product display system and method. A database stores product information for a corresponding product. An access point, which can be a reader, receives the product information. The access point is arranged to wirelessly transmit the product information within a corresponding interrogation zone. The wireless transmission uses an electronic product code (“EPC”) transmission protocol. An electronic price label (“EPL”) has an antenna, an RFID element and a display. The antenna is arranged to receive the product information from the access point. The RFID element is in communication with the antenna. The RFID element stores the received product information. The display is arranged to display the received product information. | 12-27-2012 |
20120307051 | VIDEO ENABLED ELECTRONIC ARTICLE SURVEILLANCE DETECTION SYSTEM AND METHOD - A security system and method is provided that uses an auxiliary sensor, such as a video camera, to verify the presence of an object within a part of an interrogation zone. The presence of an activated security system tag in an interrogation zone is detected. The system also determines whether an object is in a surveillance detection zone when the activated security system tag is detected. An alarm is initiated if the object is in the surveillance detection zone within a predetermined time after the activated security system tag is detected in the interrogation zone. The alarm may be based on the direction of motion of the object in the surveillance zone. | 12-06-2012 |
20120271948 | METHOD AND SYSTEM FOR LOAD BALANCING BETWEEN A VIDEO SERVER AND CLIENT - A method and system for balancing the load and resource requirements in a digital video distribution system between a video server and its video clients by allowing the server and the clients to exchange resource capabilities with each other. Upon receipt of a request for a video stream from among available video content, the server determines whether it or the requesting client should scale the video stream based on which entity, client or server, is better equipped to scale the requested video stream to comply with the requesting client's resources and resolution capacity. | 10-25-2012 |
20120262353 | SMALL BROADBAND LOOP ANTENNA FOR NEAR FIELD APPLICATIONS - A method and apparatus for providing a broadband near field of an antenna are disclosed. A small broadband loop antenna may include a printed circuit board (PCB) substrate with multiple layers. Printed on the PCB substrate are dual loops sharing a same driver circuit, an impedance matching network, a primary ground layer and a conductive layer. A shorting via connects the dual loops to a ground plane. The antenna may be tuned to a desired operating frequency by adjusting parameters of the loop, such as the position of the shorting via. | 10-18-2012 |
20120215874 | SYSTEM AND METHOD FOR AUTOMATIC CONFIGURATION OF MASTER/SLAVE DEVICES ON A NETWORK - A people counting system and method for the automatic reconfiguration of a failed people counting sensor device in a people counting system. The system includes a plurality of addressable people counting sensor devices defining a cluster having a master device in communication with at least one slave device, each of the master device and the slave devices having a corresponding Media Access Control (“MAC”) address. The master device is adapted to sequentially transmit power-on commands to each of the slave devices, assign a different node address to each of the slave devices, receive an association of the MAC address of the master device to the node address and MAC address of each of the slave devices to form a cluster configuration, store the cluster configuration as a cluster configuration table, and replicate the cluster configuration table to the slave devices. A dynamic host configuration protocol (DHCP) server assigns an IP public address to the master device. | 08-23-2012 |
20120187003 | SOFT ALARMING SAFER - A security device having a flexible material into which a product may be sealed and unauthorized removal of the product triggers a security alarm. The security device includes a flexible material adapted to house a product therein and is operable in a sealed orientation when the product is sealed within the flexible material and in an open orientation when the product is accessible from within the flexible material. Conductive material is affixed to the flexible material and forms a closed electrical circuit with an alarming device when the security device is in the sealed orientation and an open electrical circuit when the circuit is opened. The security alarm is triggered when the electrical circuit is opened. | 07-26-2012 |
20120182193 | COMBINATION ELECTRONIC ARTICLE SURVEILLANCE/RADIO FREQUENCY IDENTIFICATION ANTENNA AND METHOD - A combination EAS/RFID antenna for use in an EAS/RFID surveillance system. The antenna includes an EAS antenna element and an RFID antenna element. The EAS antenna element includes an EAS loop antenna defining an interior area. The RFID antenna element is positioned within the interior area defined by the EAS loop antenna and includes a ground plane and RFID patch antenna. The ground plane and/or the RFID patch antenna have a segmented conductor pattern etched thereon. The segmented conductor pattern minimizes eddy currents in the ground plane produced by current flow through EAS loop antenna. The RFID antenna element is situated proximate the EAS loop antenna in such a fashion that the overall size of the antenna is reduced. | 07-19-2012 |
20120169475 | SYSTEMS FOR AND METHODS OF ASSIGNING PRIORITY TO READER ANTENNAE - Methods, systems, and articles of manufacture for assigning priority to antennae are disclosed. In accordance with a preferred embodiment of the invention, reader antennae identify the location of an object by detecting a tag or other identifier associated with each object. Sensors can be provided to provide additional information regarding the environment of the objects or their surroundings. A priority order is assigned to the reader antennae based on the location and other characteristics of the objects and/or their environment. A polling sequence for reading the reader antennae is determined according to the priority order. | 07-05-2012 |
20120139709 | RFID NETWORK CONTROL AND REDUNDANCY - In accordance with embodiments of the invention, RFID network control devices (RNCDs) are provided wherein RFID traffic signals from any one of multiple RFID readers may be routed to any of the RFID antennas coupled to the RNCD. Each reader coupled directly or indirectly to the RNCD, either through its own action or the action of the external host controller managing the reader, may issue commands to the RNCD, over the same cable used to carry RFID traffic signals, and cause the RNCD to set its internal switch configuration such that a channel is established for RFID traffic signals between that reader and a particular RFID antenna coupled to the RNCD. This may include commands from the reader or external host controller which place other intervening RNCD units in a bypass state so as to establish the required communications channel with a minimum of signal strength loss. | 06-07-2012 |
20120131197 | METHOD AND APPARATUS FOR AUTOMATICALLY RESOLVING CONFLICTING DEVICES ON A NETWORK - A method and apparatus are disclosed for automatically detecting and resolving conflicts between devices on a security network by comparing the IP addresses of all devices on the network. When one or more conflicts are detected, the user is presented with the option of reassigning the conflicting device to a DHCP address, or to a new static IP address. The new static IP address can be configured to lie within a user defined range. In one embodiment, a default changes the address to any free address on the network. The disclosed method and apparatus automates the conflict resolution process without requiring that network devices (e.g., cameras, camera encoders) be individually and sequentially connected to the security network in order to resolve conflicts. The disclosed approach results in reduced human interaction and is much faster than the traditional approach of adding devices one at a time to the network. Other embodiments are also disclosed. | 05-24-2012 |
20120127314 | ITEM IDENTIFICATION USING VIDEO RECOGNITION TO SUPPLEMENT BAR CODE OR RFID INFORMATION - A method and system for confirming the identity of a product in a security system and for determining sales-related information pertaining to the products. One or more products are associated with a product identification element, such as a bar code or an RFID tag. A reader or a scanner within the system receives a signal from the product identification element containing product identity information about the product. The system further includes a camera that captures a video image of the product. Signals representing the product identity information and the video image of the product are forwarded to a data correlation unit that determines if the product associated with the product identity information matches the product in the video image. | 05-24-2012 |
20120112918 | METHOD AND SYSTEM FOR ADAPTIVE SLIDING DOOR PATTERN CANCELLATION IN METAL DETECTION - A metal detection device, system and method are provided. The device includes a receiver that receives a signal pattern representing electromagnetic field disturbances over time caused by movement of metal doors in a detection region. The device further includes a memory in communication with the receiver. The memory stores a recorded signal pattern of a previously received signal pattern and at least one quality criterion. The device further includes a processor in communication with the memory. The processor determines pattern vitals indicating a quality of the received signal pattern. The processor further determines whether the at least one quality criterion is met based at least in part on the pattern vitals. The processor further updates the recorded signal pattern based at least in part on determining whether the at least one quality criterion is met. | 05-10-2012 |
20120103863 | BENEFIT DENIAL DEVICE WITH SWIVEL ATTACHMENT - A product protection apparatus and method are provided. The product protection apparatus has an arm assembly, a first collar and a second collar. The arm assembly has a plane and is extendable in a first direction and a second direction opposite the first direction. The arm assembly has a first connection point and a second connection point. The first collar is rotatably coupled to the first connection point and is adapted to rotate about a first axis of the first connection point that is substantially orthogonal to the plane of the arm assembly. The second collar is rotatably coupled to the second connector and is adapted to rotate about a second axis of the second connection point that is substantially orthogonal to the plane of the arm assembly. The first and second collars are arranged to retain a product. | 05-03-2012 |
20120098965 | METHOD AND SYSTEM FOR CONVERTING PRIVACY ZONE PLANAR IMAGES TO THEIR CORRESPONDING PAN/TILT COORDINATES - A method and system for converting privacy zone corner points in a still image to PTZ coordinates using the equations for distance along the great circles of a sphere, where the sphere is defined along the pan-tilt axes of a PTZ camera with radius equal to the focal length of the image. The method includes receiving planar coordinate data defining a plurality of privacy zone corner points, the planar coordinate data taken from a still image, converting each privacy zone corner point to corresponding spherical coordinates, converting each of the corresponding spherical coordinates to corresponding PTZ coordinates, and storing the corresponding PTZ coordinates in a storage device. The stored PTZ coordinates may then be transmitted to a computer monitor. The motor of the PTZ camera moves the camera according to the PTZ coordinates until the privacy zone corner points appear at the substantial center of the monitor screen. | 04-26-2012 |
20120092166 | SYNCHRONIZATION OF ELECTRONIC ARTICLE SURVEILLANCE SYSTEMS HAVING METAL DETECTION - A method and system are provided for minimizing metal detection signal interference by dividing a standard EAS system metal detection burst timeslot into a plurality of timeslots per burst in order to minimize triggering metal detection false alarm signals between adjacent metal detection systems. The method and system include synchronizing a plurality of metal detection systems by generating a signal having a predefined time duration and segmenting the signal into multiple timeslots per signal. A selected timeslot that is assigned to each of the plurality of metal detection systems is stored and the system performs metal detection using the assigned timeslot. | 04-19-2012 |
20120091741 | DUAL PINCHER SECURITY SYSTEM TAG AND METHOD - A security tag that includes two different types of item-securing mechanisms within a single apparatus. The apparatus includes a first arm portion and a second arm portion forming a product clamping region, the product clamping region having a clamp to removably affix the tag to a product, and a third arm portion and a fourth arm portion forming a product piercing region, the product piecing region coupled to the product clamping region. The product piercing region includes a product piercing element to removably affix the tag to the product. Bringing together the arm portions of the product piercing region causes the arm portions of the clamping region to join together, thereby trapping a piece of a product therebetween. The piercing element of the product piercing region is retained by a latch which assists in keeping the arm portions of the clamping region together, thus retaining the product securely within the clamping region. | 04-19-2012 |
20120080526 | METHOD AND APPARATUS FOR PINLESS TAG SECURING - A security device is removably affixable to an article. The security device includes a housing having a securing pad, a locking element and a strap. The locking element is disposed within the housing. The strap includes a first end having a latching region that is insertable into the housing and a second end having a securing region. The strap is slidingly movable between an open position and a locked position. The locking element engages with the latching region of the strap. An eccentrically mounted wheel may be mounted on one of the securing region of the strap and the securing pad. When in the locked position, the eccentrically mounted wheel secures the article between the securing pad and the securing region of the strap. | 04-05-2012 |
20120079858 | BI-DIRECTIONAL ADJUSTABLE BENEFIT DENIAL SAFER/KEEPER - A size-adjustable apparatus for a securing a product in order to prevent theft of that product. The apparatus includes an adjustable housing, the housing having a first arm, a second arm, and a third arm. The first arm is adapted to move in a first direction and a second direction with respect to the third arm and the second arm is adapted to move in a third direction and a fourth direction with respect to the third arm, where the first direction is opposite the second direction and the third direction is opposite the fourth direction. The apparatus also includes a lock to retain the adjustable housing in a desired position. The result is a housing that can dynamically change its dimensions by movement of the first arm in a first and second direction and by movement of the second arm in a third and fourth direction. | 04-05-2012 |
20120055944 | SECURITY SYSTEM HARD TAG CLAMP AND CLAMPING METHOD - A security tag that includes a mechanism for preventing the unauthorized removal of a security tag from its article. The security tag includes a housing having a clamp axis. A clamp is contained within the housing. The clamp is rotatable about the clamp axis from a locked position to an unlocked position. The clamp includes a lock region lockable to the housing, and a release region. The mechanism prevents the security tag from being removed from its article unless the lock region is unlocked from the housing and a force is applied to the release region. | 03-08-2012 |
20120038480 | INTEGRATED DATA READER AND ELECTRONIC ARTICLE SURVEILLANCE (EAS) SYSTEM - An integrated data reader and electronic article surveillance (EAS) system, and methods of operation. Several configurations are also disclosed for alternate deactivation coil designs and mounting schemes. | 02-16-2012 |
20120032803 | SECURITY TAG WITH INTEGRATED EAS AND ENERGY HARVESTING MAGNETIC ELEMENT - An EAS security tag for providing both EAS and battery recharging features within one tag. The tag includes a rechargeable battery and an antenna having a magnetic core and at least one coil winding disposed around at least a portion of the core. The antenna supplies a voltage corresponding to a first frequency or a second frequency when placed within a magnetic field. The tag also includes an EAS circuit having a resonant frequency corresponding to the first frequency, and an energy harvesting circuit having a resonant frequency corresponding to the second frequency, where the battery recharging circuit recharges the rechargeable battery. Depending upon the magnetic field that the tag is exposed to, either the EAS circuit is enabled thus allowing for EAS detection or the energy harvesting circuit is enabled allowing for the battery to be recharged. | 02-09-2012 |
20120018505 | Tag having dipole-loop antenna - A tag has a dipole and loop antenna. | 01-26-2012 |
20120018504 | Tag having three component unitary pole antenna - A tag has antenna system includes three antenna portions. Each of the three antenna portions has a ½ dipole structure. A fourth antenna portion is shorted to the non-linear device. The antenna is tuned to an operating frequency by modifying the electrical lengths of one, two, or all three antenna portions. Preferably, the invention includes an inductive portion, such as a slot inductive portion. The antenna portions are configured in any desired form, such as being spiral or otherwise compacted, for particular operational parameters in a limited space. | 01-26-2012 |
20120001814 | WIDE BANDWIDTH HYBRID ANTENNA FOR COMBINATION EAS AND RFID LABEL OR TAG - A radio frequency identification (RFID) antenna exhibiting a multiple resonance is disclosed. In one exemplary embodiment, a dipole antenna and a loop antenna are disposed upon a substrate and have dimensions and orientation to exhibit the multiple resonance. The dipole antenna may exhibit a first dipole section having a first length and second dipole section having a second length. The loop antenna may be disposed in a region of the dipole antenna. The ratio of the perimeter of the loop antenna to the sum of the lengths of the dipole sections may be selected to exhibit the multiple resonance. | 01-05-2012 |
20110317594 | HYBRID ARCHITECTURE FOR RADIO FREQUENCY IDENTIFICATION AND PACKET RADIO COMMUNICATION - A radio frequency identification (“RFID”) hybrid packet radio is provided having full duplex operability. The RFID packet radio includes an antenna and a radio that receives and transmits a packet radio signal and a RFID signal. A processor is provided in communication with the radio to perform signal detection and demodulation with respect to the RFID signal. A transmit path is provided to transport the packet radio signal and the RFID signal from the radio to the antenna. The RFID packet radio includes a first receive path for transporting a received packet radio signal from the antenna to the radio and a second receive path, different from the first receive path, to transport a received RFID signal from the antenna to the processor. The first receive path and the second receive path enable simultaneous transmission and reception of RFID signals. | 12-29-2011 |
20110308284 | Optical disc security device having a magnetically actuable locking mechanism - A security device having magnetically actuable locking mechanism for security an optical disc is disclosed. The device includes a detectable security tag secured in a housing having an optical disc receptacle formed as a basin. The housing includes one or more arcuate grooves adjacent to the circular basin. A top cover is sized to fit into the circular basin and is configured to be rotatably mateable with the housing. The top includes arcuate lips extending outwardly therefrom adapted for sliding rotatable engagement with the one or more the arcuate grooves in the housing. Locking the device prevents the top cover from being rotated to a position where the arcuate grooves are fully disengaged with the arcuate lips. | 12-22-2011 |
20110273360 | COMBINATION RADIO FREQUENCY IDENTIFICATION AND ELECTRONIC ARTICLE SURVEILLANCE ANTENNA SYSTEM - An RFID antenna for use in an RFID-EAS antenna system is disclosed. In one embodiment, the RFID antenna has a first patch antenna element and a second patch antenna element that are electrically connected and coplanar. The RFID antenna also has a reference ground plane coplanar with the patch antenna elements. | 11-10-2011 |
20110273301 | METHOD AND SYSTEM FOR SLIDING DOOR PATTERN CANCELLATION IN METAL DETECTION - A method and system for reducing the signal interference effects of metal doors in a metal detection system. The system includes a transmitter operable to transmit an interrogation signal that is used to detect transitory metal objects within the detection region, a receiver operable to receive instantaneous signals that represent electromagnetic field disturbances during operation of the metal detection system and include electromagnetic field disturbances attributed to the movement of metal doors. The system also includes a metal detection module that determines a resulting waveform representing the difference between the instantaneous signals received during operation of the metal detection system and a recorded pattern of signals representing electromagnetic field disturbances caused by a pattern of movement of the metal doors in the detection region when a transitory metallic object is not present. The record pattern is canceled from the resulting waveform leaving only signals from transitory metal objects. | 11-10-2011 |
20110273271 | METHOD AND SYSTEM FOR RADIO FREQUENCY IDENFICATION TAG USING REDUCED SET COMMUNICATION PROTOCOL - A method and tag for decoding a signal received from a radio frequency identification (“RFID”) reader. A signal is received from the RFID reader in which the signal has a series of pulses. A time frame between receipt of two consecutive pulses is measured to determine whether the pulses represent zero bits or one bits. A total pulse duration is calculated in which the total pulse duration represents a sum of the measured time frames for the signal. A command is decoded. The decoding is based on the total duration of the two pulses. | 11-10-2011 |
20110261195 | METHOD AND SYSTEM FOR SECURITY SYSTEM TAMPERING DETECTION - A method and system for detecting tampering of a security system component is provided. An analytic alarm indicative of potential tampering with a security system component is received. Data from at least one sensor is received. A computing device is used to analyze the analytic alarm and the data from the at least one sensor to determine whether tampering of the security system component has occurred. A qualified alarm signal is generated when the analysis of the analytic alarm and the data from the at least one sensor is indicative of tampering. | 10-27-2011 |
20110260865 | METHOD FOR REDUCING METAL DETECTION SYSTEM FALSE ALARMS - A system and method for reducing the occurrence of false alarms in metal detection systems and combination EAS/metal detection systems. The system includes a motion sensor mounted on or near an antenna housing, such as an EAS pedestal, at the entrance/exit of a given interrogation zone. The motion sensor detects movement or vibration of the antenna housing. The sensor transmits signals to a controller that determines if the antenna housing has moved a predetermined amount. The system includes a metal detection module that determines if metal objects are proximate the pedestal. If metal objects are detected, a metal detection alarm is enabled. However, if it is determined that the antenna housing is moving or vibrating at least a predetermined amount, the controller inhibits generation of the metal detection alarm signal. | 10-27-2011 |
20110253790 | SECURE BATTERY COMPARTMENT FOR ALARMING HARD TAG - An electronic article surveillance (“EAS”) tag for securing an item of merchandise is provided. The EAS tag includes a housing defining an opening leading to a compartment therein. A battery is removably disposed within the compartment. An alarm transducer is electrically connected to the battery. A cover is releasably engageable with the housing to cover the opening. A an anchor is releasably engageable with the housing and adapted to removably affix the housing to the item of merchandise. The anchor overlaps at least a portion of the cover when engaged to the housing to prevent removal of the cover when the anchor is engaged to the housing. | 10-20-2011 |
20110215929 | SYSTEM FOR TESTING REUSABLE ELECTRONIC ARTICLE SURVEILLANCE TAGS AND METHOD THEREFOR - A system and method for automatically sorting, cleaning, testing and counting reusable visible source tags (VSTs) and for detecting and rejecting tags that are not functioning within predetermined parameters. The system includes a first sub-system that stores and feeds the VSTs to a vibratory bowl where they are initialized. A second sub-system transfers the tags from the vibratory bowl and sorts the tags assuring the tags are reusable rather than disposable tags. A third sub-system tests the reusable tags to assure compliance with select parameters such as frequency and amplitude. If the reusable tags comply with the parameters then they are deemed activatable. The system may also automatically sort and count the accepted and rejected tags. The system disclosed herein is capable of testing VSTs at a high speeds, e.g., up to 150 units per minute, with the required quality level and reliability. | 09-08-2011 |
20110215928 | METHOD AND SYSTEM FOR REDUCING EFFECT OF INTERFERENCE IN INTEGRATED METAL DETECTION/ELECTRONIC ARTICLE SURVEILLANCE SYSTEMS - An integrated electronic article surveillance (“EAS”)/metal detection system. The system includes a transmitter operable to transmit an EAS interrogation signal, where the EAS interrogation signal establishes an interrogation zone and is used to detect EAS markers and metal objects within the interrogation zone. The EAS interrogation signal is transmitted at a first frequency during an EAS detection cycle and at a second frequency during a metal detection cycle. The system includes a receiver operable to detect a signal received from an EAS marker, and a metal detector module operable to detect a metal object in proximity to the integrated EAS/metal detection system, where the metal detector module includes a filter tuned to substantially filter out the first transmission frequency. | 09-08-2011 |
20110215157 | SYSTEM AND METHOD FOR SECURITY TAG DEPLOYMENT USING REVERSIBLE ADHESIVES - A method and system for security tag attachment using a reversible adhesive in which a security tag has an outer surface and an inner volume. The tag includes at least one of an Electronic Article Surveillance (EAS) element and a Radio Frequency Identification (RFID) element disposed within the inner volume. The system also includes a reversible adhesive disposed on at least a portion of the outer surface. | 09-08-2011 |
20110215156 | SECURITY SYSTEM TAG HAVING COMBINED CLAMP AND ANTENNA - A security tag incorporating a hybrid clamp that combines an attachment clamp with an RFID component. The attachment clamp is used to secure an item, such as an article of clothing, to the tag. The RFID component, e.g., an RFID antenna, transmits data signals to an RFID reader where the data signals are encoded with information stored about the security tag. By combining the attachment features and RFID features of the security tag in one hybrid clamp, more tag space can be freed up for other components and manufacturing cost savings can be realized. | 09-08-2011 |
20110199211 | METHOD OF ASSIGNING AND DEDUCING THE LOCATION OF ARTICLES DETECTED BY MULTIPLE RFID ANTENNAE - In accordance with preferred embodiments or the invention, a method (and corresponding apparatus) is provided for deducing the location of one or more items or objects to be monitored. In exemplary embodiments, the method (and corresponding apparatus) is implemented in RFID (radio frequency identification) applications (e.g., reading RFID tags at 13.56 MHz and approximately 900 MHz) by deducing the location of an item associated with a unique RFID tag in one or more areas of detection covered by multiple RFID reader antennae. | 08-18-2011 |
20110171910 | METHOD AND SYSTEM FOR RECEIVER NULLING USING COHERENT TRANSMIT SIGNALS - A method and system are provided for canceling interference signals from a received signal. A ratio module receives as input a ratio of a filtered receiver output signal level and a filtered transmitter output signal level. A product module receives as inputs an output of the ratio module and a transmitter output. The product module calculates a product of the output of the ratio module and the transmitter output. An adjusted receiver signal module receives a difference calculated from the received signal level and the output of the product module. The method and system are suitable for use in a metal detection subsystem with a larger security system. | 07-14-2011 |
20110169612 | METHOD AND SYSTEM FOR DISCOVERY AND TRANSPARENT STATUS REPORTING FOR SENSOR NETWORKS - A system and method for monitoring the status of wireless node devices in a network. A network controller polls one or more sensor devices for status information. The sensor devices are in communication with at least one wireless node device. More than one sensor device may be associated with a single wireless node device. The wireless node device appends its own status information to the transmission frame of the sensor device's response message, and the transmission frame, containing the address and status information for both the sensor device and the wireless node device, is transmitted to the network controller. The inclusion of the wireless node device address and status information is done without the knowledge of the sensor device. | 07-14-2011 |
20110133551 | BATTERY BACKED POWER-OVER-ETHERNET SYSTEM - A power control system arranged for use in a power-over-Ethernet system comprises a battery ( | 06-09-2011 |
20110109456 | SYSTEM AND METHOD USING PROXIMITY DETECTION FOR REDUCING CART ALARMS AND INCREASING SENSITIVITY IN AN EAS SYSTEM WITH METAL SHIELDING DETECTION - A system for detecting electronic article surveillance (“EAS”) marker shielding includes an EAS subsystem, a metal detector, an object detector, a timer, a cart detection subsystem and a processor. The EAS subsystem is operable to detect an EAS marker in an interrogation zone. The metal detector is operable to detect a metal object in the interrogation zone. The object detector is operable to detect objects located proximate to an entry point of the EAS subsystem. The timer is programmed to start a countdown sequence upon receiving a signal generated by the object detector. The cart detection subsystem includes a sensor array. The cart detection subsystem is operable to differentiate between a wheeled device and a human passing through the interrogation zone based on an output of the sensor array. The processor is electrically coupled to the EAS subsystem, the metal detector, the object detector, the timer and the cart detection subsystem. The processor is programmed to receive a signal from the object detector and the timer to initiate gathering information outputted from the cart detection subsystem and information outputted from the metal detector to determine whether to generate an alarm signal based on the presence of EAS marker shielding. | 05-12-2011 |
20110001620 | COMBINATION EAS AND RFID SECURITY TAG HAVING STRUCTURE FOR ORIENTING A HYBRID ANTENNA RFID ELEMENT - A security tag including independent EAS and RFID components disposed in a housing configured for geometric placement of the RFID and EAS components for optimum RFID performance. The EAS component is situated in a first compartment and the RFID component is situated in a second compartment. The RFID component includes a hybrid antenna RFID inlay and an IC chip. The tag housing includes a key structure that minimizes the de-tuning of both the EAS and RFID components by positioning the IC chip such that the IC chip is closer to a first side of the second compartment than the second side of the second compartment when the antenna inlay is inserted within the housing. The housing further includes one or more pins that raise the RFID inlay above the magnetic resonator of the EAS component to further insure optimal RFID read performance. | 01-06-2011 |