摘要:
Systems and methods for operating a tag reader. The methods comprise: performing tag read operations by the tag reader to read tags; processing first information received from the read tags to identify which tags are newly detected tags; adding entries for the newly detected tags in a local list stored in a local memory of the tag reader; communicating second information at least identifying the newly detected tags from the tag reader to a remote computing device; receiving, by the tag reader, feedback information generated by the remote computing device which specifies at least a count of entries added to a remote list stored in a remote datastore based on the second information; and selectively outputting a notification from the tag reader based on the value of the count.
摘要:
Systems and methods for determining a tag's position in a given area. The methods comprise: performing, by a tag reader, a standard inventory process to obtain a unique identification code for a first tag in a randomly selected timeslot; assigning, by the tag reader, a local short address to the first tag that is shorter than the unique identification code; wirelessly communicating the local short address from the tag reader to the first tag; performing, by the tag reader, an enhanced inventory process to receive a ping command response signal including the local short address from the first tag in an assigned timeslot; and determining a first position of the first tag in the given area based on the phase of the ping command response signal.
摘要:
Systems and methods for operating a pedestal of an Electronic Article Surveillance (“EAS”) system. The methods comprise: capturing at least one first image or video by a camera coupled to the pedestal; analyzing the at least one first image or video to detect a person's presence and determine the person's location relative to the camera; determining a first beam pointing direction for the pedestal based on results of the analysis of the at least one first image or video; and steering a read beam of the pedestal in accordance with the first beam pointing direction so that a main lobe of the pedestal's antenna field pattern covers a first area of an interrogation zone.
摘要:
Systems and methods for determining an inventory. The methods comprise: placing an RFID tag in a first operational mode in which at least one communication operation or device of the RFID tag is disabled or bypassed; performing first operations by the RFID tag to determine when it is time to begin communications in accordance with the time slotted communications scheme; transitioning an operational mode of the RFID tag from the first operational mode to a second operational mode in which the communication operation(s) or device of the RFID tag is enabled or no longer bypassed, in response to a determination that it is time for the RFID tag to begin communications; and transitioning the operational mode of the RFID tag back into the first operational mode when the RFID tag's communications with a remote tag reader for inventory determination purposes are complete or a time slot has expired.
摘要:
Systems and methods for operating an Unmanned Mobile Machine (“UMM”). The methods comprise: detecting, by a Loss Prevention System (“LPS”), an unusual activity by at least one individual in a facility; communicating a signal from the loss prevention system to the UMM, in response to the detection of the unusual activity; transitioning an operational state of the UMM from a first state in which at least mitigation operations are disabled to a second state in which the mitigation operations are enabled, in response to the signal's reception at the UMM; and performing the mitigation operations by the UMM to visibly follow an individual associated with the unusual activity.
摘要:
Systems and methods for determining an inventory. The methods comprise: placing an RFID tag in a first operational mode in which at least one communication operation or device of the RFID tag is disabled or bypassed; performing first operations by the RFID tag to determine when it is time to begin communications in accordance with the time slotted communications scheme; transitioning an operational mode of the RFID tag from the first operational mode to a second operational mode in which the communication operation(s) or device of the RFID tag is enabled or no longer bypassed, in response to a determination that it is time for the RFID tag to begin communications; and transitioning the operational mode of the RFID tag back into the first operational mode when the RFID tag's communications with a remote tag reader for inventory determination purposes are complete or a time slot has expired.
摘要:
Systems and methods for operating an Unmanned Mobile Machine (“UMM”). The methods comprise: detecting, by a Loss Prevention System (“LPS”), an unusual activity by at least one individual in a facility; communicating a signal from the loss prevention system to the UMM, in response to the detection of the unusual activity; transitioning an operational state of the UMM from a first state in which at least mitigation operations are disabled to a second state in which the mitigation operations are enabled, in response to the signal's reception at the UMM; and performing the mitigation operations by the UMM to visibly follow an individual associated with the unusual activity.
摘要:
An interactive video system transmits a composite digital information signal consisting of a winnowed generic information signal and a local information signal manipulated to produce an output signal including both data code and object code. This output signal is formatted and transmitted via modulator cards at the system head end to decoders located at the individual users' television sets. Each card uses a dynamic gate array having a configuration sequence determined by a resident configuration EPROM which can be changed in the field. Data is fed to the configured array under the control of a control data EPROM also resident in the modulator card. A transmission modulator in the modulator card receives the data from the dynamic gate array for transmission via any selected medium to the user's location.
摘要:
Systems and methods for determining a physical location of a first Radio Frequency Identification (“RFID”) tag. The methods involve: analyzing timestamped tag read information acquired during multiple tag reads to determine a first physical location for the first RFID tag read by the mobile reader while moving through a facility; identifying second RFID tags from a plurality of RFID tags read by the mobile reader that are located in proximity to the first RFID tag and that are coupled to objects similar to an object to which the first RFID tag is coupled; selecting an RFID tag from the second RFID tags that has a first location confidence value associated therewith which is greater than second location confidence values associated with other RFID tags of the second RFID tags; and modifying the first physical location based on a second physical location of the RFID tag selected from the second RFID tags.
摘要:
Systems and methods for returning an item. The methods comprise: performing item return operations by a computing device using at least one of machine learned information about a person who purchased the item, machine learned information about a person returning the item, and machined learned information about a condition of the item at the time of sale and at the time of return; and automatively sorting the item using a conveyer system to move the item from a counter to a respective storage area of a plurality of storage areas assigned to different product types.