摘要:
Systems and methods for operating a security tag of an Electronic Article Surveillance (“EAS”) system. The methods involve providing a unique identifier from the security tag to an application installed on a mobile communication device via a first short-range communication when the security tag is attached to an article for sale. A second short-range communication is received by the security tag from the mobile communication device that comprises a detachment command. The detachment command is received by the security tag exclusively after the article has been successfully purchased. Thereafter, the security tag verifies that the second short-range communication is intended to be processed thereby. Next, the security tag performs operations to actuate a detachment mechanism in response to the detachment command so that the security tag can be detached from the article for sale.
摘要:
Systems (100) and methods (500, 600) for adaptively managing power for an Energy Harvesting System (“EHS”). The methods involve: measuring a light intensity level available in a surrounding environment; wirelessly communicating a first wireless signal from the EHS (100) to a remote device (700) for causing the light intensity level to be increased by remotely turning on a light source (106, 108) or opening a cover preventing light emitted from the light source from reaching the EHC, when the light intensity level is below a pre-specified level; using an Energy Harvesting Circuit (“EHC”) to recharge a rechargeable battery (310) when the light intensity level rises above the pre-specified level; and wirelessly communicating a second wireless signal from the EHS to the remote device for causing the light source be turned off or the cover to be closed, when the capacity or state-of-charge of the rechargeable battery reaches a pre-specified value.
摘要:
Systems (100) and methods (500, 600) for adaptively managing power for an Energy Harvesting System (“EHS”). The methods involve: measuring a light intensity level available in a surrounding environment; wirelessly communicating a first wireless signal from the EHS (100) to a remote device (700) for causing the light intensity level to be increased by remotely turning on a light source (106, 108) or opening a cover preventing light emitted from the light source from reaching the EHC, when the light intensity level is below a pre-specified level; using an Energy Harvesting Circuit (“EHC”) to recharge a rechargeable battery (310) when the light intensity level rises above the pre-specified level; and wirelessly communicating a second wireless signal from the EHS to the remote device for causing the light source be turned off or the cover to be closed, when the capacity or state-of-charge of the rechargeable battery reaches a pre-specified value.
摘要:
Systems (100) and methods (500, 600) for adaptively managing power for an Energy Harvesting System (“EHS”). The methods involve: measuring a light intensity level available in a surrounding environment; wirelessly communicating a first wireless signal from the EHS (100) to a remote device (700) for causing the light intensity level to be increased by remotely turning on a light source (106, 108) or opening a cover preventing light emitted from the light source from reaching the EHC, when the light intensity level is below a pre-specified level; using an Energy Harvesting Circuit (“EHC”) to recharge a rechargeable battery (310) when the light intensity level rises above the pre-specified level; and wirelessly communicating a second wireless signal from the EHS to the remote device for causing the light source be turned off or the cover to be closed, when the capacity or state-of-charge of the rechargeable battery reaches a pre-specified value.
摘要:
A networked system for managing a physical intrusion detection/alarm includes an upper tier of server devices, comprising: processor devices and memory in communication with the processor devices, a middle tier of gateway devices that are in communication with upper tier servers, and a lower level tier of devices that comprise fully functional nodes with at least some of the functional nodes including an application layer that execute routines to provide node functions, and a device to manage the lower tier of devices, the device instantiating a program manager that executes a state machine to control the application layer in each of the at least some of the functional nodes.
摘要:
Disclosed are techniques to authenticate tags passing through detection regions against an access control list, receive data that identifies a number of people passing through or within the detection regions, compare the number people identified by the received data with the number of tags identified by the system, and cause an alarm to be asserted when a discrepancy is detected in the number people identified with the number of tags in a detection region with personnel within the detection region.
摘要:
A surveillance system includes one or more camera systems at least some of the camera systems including a camera element comprising optical components to capture and process light to produce images, camera processing circuitry that receives the light and processes the into electrical signals and encodes the signals into a defined format, power management circuitry to power the camera system, the power management system including first and second power interfaces and first and second video output interfaces.
摘要:
A deactivator having a deactivation antenna coil and a capacitor to store energy. The deactivator converts the stored energy to an alternating current over a deactivation period to generate a deactivation magnetic field when driven through the deactivation antenna coil during the deactivation period. The alternating current defines a ring down envelope during the deactivation period. An energy recovery module having an electrical impedance is coupled to the deactivator to recover a portion of the energy converted to the alternating current during a portion of the deactivation period based on the impedance. Other embodiments are described and claimed.
摘要:
Disclosed are techniques to authenticate tags passing through detection regions against an access control list, receive data that identifies a number of people passing through or within the detection regions, compare the number people identified by the received data with the number of tags identified by the system, and cause an alarm to be asserted when a discrepancy is detected in the number people identified with the number of tags in a detection region with personnel within the detection region.
摘要:
Embodiments of intrusion detection systems are described and which include an intrusion detection panel that receives binary and metadata sensor data from which the presence of an alarm condition is detected. In addition sensor devices analyze sensor data received from other sensor devices that are in a peer to peer relationship with the corresponding sensor device to validate whether the indicated alarm condition is a valid alarm or a false alarm.