摘要:
A security system including a security tag is provided. The security tag includes a housing and a pin in which the pin is removably insertable into the housing. The security tag further includes a latching element disposed within the housing and positionable in a lock position and in an unlock position. The latching element includes a pivot axis. The latching element has a substantially balanced rotational response about the pivot axis when exposed to an external physical mechanical impulse. The security tag further includes a bias element that releasably positions the latching element in the lock position. The latching element releasably engages the inserted pin when in the lock position.
摘要:
An integrated electronic article surveillance ("EAS")/metal detection system. The system includes a transmitter operable to transmit an EAS interrogation signal, where the EAS interrogation signal establishes an interrogation zone and is used to detect EAS markers and metal objects within the interrogation zone. The EAS interrogation signal is transmitted at a first frequency during an EAS detection cycle and at a second frequency during a metal detection cycle. The system includes a receiver operable to detect a signal received from an EAS marker, and a metal detector module operable to detect a metal object in proximity to the integrated EAS/metal detection system, where the metal detector module includes a filter tuned to substantially filter out the first transmission frequency.
摘要:
Systems (100) and methods (600-900) for adaptively controlling a transmitter field in an EAS detection system. The methods comprise: detecting the presence of a first person located in proximity to a first pedestal of the EAS detection system using a first proximity sensor disposed on the first pedestal; determining a first distance value representing a distance from the first pedestal to the first person whose presence was previously detected using distance information obtained from the first proximity sensor; using the first distance value to select a criteria for use in determining whether the alarm issuance should be inhibited; and adaptively controlling the alarm issuance if the criteria which was previously selected is met based at least on a first amplitude of a security tag signal received at the first pedestal.
摘要:
Systems (100) and methods (1800) for making a marker housing. The methods comprise: forming a first housing portion from a flexible material so as to have a planar shape; and forming a second housing portion (700, 1200, 1500) from the flexible material so as to comprise a cavity (702, 1202) in which resonator and bias elements (104, 110) of the marker can be housed when the second housing portion is coupled to the first housing portion. The cavity is defined by two opposing short sidewalls (708, 712), two opposing elongate sidewalls (706, 710) and a bottom sidewall (704). The two opposing elongate sidewalls are stiffened such that crushing and bending thereof is made difficult. The stiffening is achieved by forming a plurality of first stiffener edge features (714) along an exterior surface of each of the two opposing elongate sidewalls which partially define the cavity of the second housing portion.
摘要:
A security tag includes an EAS component having a defined surface area, and an RFID component having a defined surface area. The EAS component surface area is configured to at least partially overlap the RFID component surface area. The RFID component includes an antenna which at least partially overlaps the first surface. A substantially planar spacer having a thickness is at least partially disposed between the defined surface areas of the EAS and RFID components. The RFID element read range is affected and controlled by the spacing between the RFID element and the EAS element. The RFID reader is capable of activating the RFID component when the RFID component is within the read range. The antenna includes a magnetic loop antenna in electrical contact with a spiral antenna to increase near field read response.
摘要:
A combined motion detection and access control method and system, the system including a processor for receiving an indication of motion detection within a premises and for ascertaining an area within which the motion was detected; at least one transmitter operable, responsive to receiving, from the processor, an indication of the area, for broadcasting, within the area, an encoded identification of the area; a transceiver associated with an individual and operable for receiving the encoded area identification and, responsive thereto, for broadcasting an encoded identification of the individual and the encoded area identification; and at least one receiver operable for receiving the encoded identification of the individual and the encoded area identification and for communicating the encoded identification of the individual and the encoded area identification to the processor which is operable, thereto, for ascertaining whether the individual is allowed access to the area encoded in the encoded area identification.
摘要:
A networked system for managing a physical intrusion detection/alarm includes a network of end nodes, e.g., sensor nodes including one or more constrained sensor nodes for sensing physical conditions, and a gateway to provide network connections for the constrained sensor nodes. The system also includes a range extender for connecting the one or more constrained sensor nodes to the gateway, with the range extender including first and second radios and corresponding processors to wirelessly communicate with the gateway and constrained nodes.
摘要:
A networked system for managing a physical intrusion detection/alarm includes a network of end nodes, e.g., sensor nodes including one or more constrained sensor nodes for sensing physical conditions, and a gateway to provide network connections for the constrained sensor nodes. The system also includes a range extender for connecting the one or more constrained sensor nodes to the gateway, with the range extender including first and second radios and corresponding processors to wirelessly communicate with the gateway and constrained nodes.
摘要:
A detacher for unlocking a security tag having a locking mechanism is provided. The detacher includes a detaching element in which the detaching element is configured to unlock the locking mechanism if the detaching element is activated. The detacher includes a reader in which the reader is configured to receive a user identifier associated with at least one user. The detacher includes a memory. The memory is configured to store at least one user rule. The detacher includes a processor in which the processor is configured to determine whether the received user identifier meets the at least one user rule. The processor is further configured activate the detaching element if the received user identifier meets the at least one user rule. The detaching element remains deactivated if the received user identifier does not meet the at least one user rule.