摘要:
A resonant tag for an article surveillance system comprising a voltage dependent capacitance means whose capacitance can be varied with changes in voltage to selectively provide one or more resonant frequencies for the resonant tag.
摘要:
Binary messages received over a radio channel are subject to fading or noise degradation because of the radio channel. Accordingly, a predetermined binary preamble followed by a synchronizing word are transmitted ahead of the message. In order that the synchronization be correct, the end of the preamble should be determined as accurately as possible. This is achieved by fast and slow detectors which receive the preamble. The fast detector output is applied to a time delay. The slow detector and the time delay outputs are applied to an output circuit which produces an output signal in response to the slow detector and the time delay outputs both being present. The fast and slow detectors and the time delay are arranged so that the output signal is produced at the desired time after the preamble begins, thereby accurately indicating when the synchronizing word is to begin.
摘要:
Systems and methods for operating a security system. The methods comprise: monitoring an area for a presence of an individual or vehicle using wireless signals of a first type that are received by a first radio of the security system; operating the first radio as a wireless sensor for generating sensor data; determining whether the individual or vehicle is exhibiting an unusual behavior using the sensor data and pre-programmed or machine learned patterns of unusual behavior; changing an operating frequency of the first radio when a determination is made that the individual or vehicle is exhibiting unusual behavior; and communicating a wireless signal of a second type from the first radio when the individual or vehicle is exhibiting unusual behavior, where the second type is different than the first type.
摘要:
Systems and methods for dynamically changing displayed content of a tag coupled to an item. The methods comprising: detecting when an individual is in proximity to the tag; triggering operations, by a computing device remote from the tag, to obtain customer related information associated with the individual, when a detection is made that the individual is in proximity to the tag; determining, by the computing device, a price discount for the item based on the customer related information which was previously obtained; and dynamically changing the displayed content of the tag to include the price discount while the individual is still in proximity to the tag.
摘要:
Predictive theft notifications are used to coordinate appropriate responses to persons who are likely to commit acts of theft. Image data is generated and processed in a computer processing device to recognize the presence of a facial image comprising a face of a person. An analysis is performed of data representative of the facial image to determine a biometric match relative to one or more biometric models of facial images stored in a database. Based on this analysis, at least one predictive notification is generated with regard to a future potential theft of merchandise from the secured facility. The predictive notification is generated based upon a determination of the biometric match.
摘要:
Systems and methods for operating an Unmanned Mobile Machine (“UMM”). The methods comprise: detecting, by a Loss Prevention System (“LPS”), an unusual activity by at least one individual in a facility; communicating a signal from the loss prevention system to the UMM, in response to the detection of the unusual activity; transitioning an operational state of the UMM from a first state in which at least mitigation operations are disabled to a second state in which the mitigation operations are enabled, in response to the signal's reception at the UMM; and performing the mitigation operations by the UMM to visibly follow an individual associated with the unusual activity.
摘要:
Systems and methods for making a marker. The methods comprise: disposing a resonator with a flat planar cross-sectional profile in a cavity formed in a first substrate partially defining a marker housing; sealing the cavity using a second substrate; placing a first bias element adjacent to the second substrate so that the resonator will be biased by the first bias element when the marker is in use to oscillate at a frequency of a received transmit burst; and using a physical structure in the cavity or a magnetic field passing through the cavity to reduce frictional forces between the resonator and at least the second substrate.
摘要:
Systems and methods for dynamically changing displayed content of a tag coupled to an item. The methods comprising: detecting when an individual is in proximity to the tag; triggering operations, by a computing device remote from the tag, to obtain customer related information associated with the individual, when a detection is made that the individual is in proximity to the tag; determining, by the computing device, a price discount for the item based on the customer related information which was previously obtained; and dynamically changing the displayed content of the tag to include the price discount while the individual is still in proximity to the tag.
摘要:
Systems and methods for making a marker. The methods comprise: obtaining a marker housing having first and second cavities formed therein; disposing a first resonator in the first cavity and a second resonator in a second cavity; and placing a bias element at a location on or in the marker so that the first and second resonators are (a) equally spaced apart from the same bias element and (b) biased by the same bias element when the marker is in use to oscillate at a frequency of a received transmit burst.
摘要:
Systems and methods for operating an Unmanned Mobile Machine (“UMM”). The methods comprise: detecting, by a Loss Prevention System (“LPS”), an unusual activity by at least one individual in a facility; communicating a signal from the loss prevention system to the UMM, in response to the detection of the unusual activity; transitioning an operational state of the UMM from a first state in which at least mitigation operations are disabled to a second state in which the mitigation operations are enabled, in response to the signal's reception at the UMM; and performing the mitigation operations by the UMM to visibly follow an individual associated with the unusual activity.