摘要:
Systems and methods for making a marker. The methods comprise: disposing a resonator with a flat planar cross-sectional profile in a cavity formed in a first substrate partially defining a marker housing; sealing the cavity using a second substrate; placing a first bias element adjacent to the second substrate so that the resonator will be biased by the first bias element when the marker is in use to oscillate at a frequency of a received transmit burst; and using a physical structure in the cavity or a magnetic field passing through the cavity to reduce frictional forces between the resonator and at least the second substrate.
摘要:
Systems and methods for dynamically changing displayed content of a tag coupled to an item. The methods comprising: detecting when an individual is in proximity to the tag; triggering operations, by a computing device remote from the tag, to obtain customer related information associated with the individual, when a detection is made that the individual is in proximity to the tag; determining, by the computing device, a price discount for the item based on the customer related information which was previously obtained; and dynamically changing the displayed content of the tag to include the price discount while the individual is still in proximity to the tag.
摘要:
Systems and methods for making a marker. The methods comprise: obtaining a marker housing having first and second cavities formed therein; disposing a first resonator in the first cavity and a second resonator in a second cavity; and placing a bias element at a location on or in the marker so that the first and second resonators are (a) equally spaced apart from the same bias element and (b) biased by the same bias element when the marker is in use to oscillate at a frequency of a received transmit burst.
摘要:
Systems and methods for operating an Unmanned Mobile Machine (“UMM”). The methods comprise: detecting, by a Loss Prevention System (“LPS”), an unusual activity by at least one individual in a facility; communicating a signal from the loss prevention system to the UMM, in response to the detection of the unusual activity; transitioning an operational state of the UMM from a first state in which at least mitigation operations are disabled to a second state in which the mitigation operations are enabled, in response to the signal's reception at the UMM; and performing the mitigation operations by the UMM to visibly follow an individual associated with the unusual activity.
摘要:
System for controlling access comprises a reader unit (108) which is disposed at a portal (102) to a controlled access area (118) and a wearable access device (WAD) (114) which is worn by a user (116). The reader and the WAD implement a bidirectional optical communication protocol (BOCP) to communicate digital data. The WAD receives an interrogation signal from the reader for initiating an access control interaction. At least one of the reader and the WAD uses a predetermined optical beam width (142, 308) and a boresight direction (140, 306) of an optical beam associated with the wireless optical communication link to facilitate a selective determination as to whether the WAD will respond to the interrogation signal with a reply signal to continue with the access control interaction.
摘要:
Systems (100) and methods (1100) for activating an Electronic Article Surveillance (“EAS”) element deactivator. The methods involve: obtaining customer-related data from a customer of a business organization who is attempting to deactivate an EAS element of at least one item; obtaining transaction data contained in a receipt issued upon completion of a checkout transaction for the customer; communicating the customer-related data, transaction data and a unique identifier for an EAS element deactivation system to a remote computing device; processing the customer-related data and transaction data to obtain confirmation that the customer has recently successfully completed the checkout transaction for the item and the EAS element of the item has not yet been deactivated; and activating the EAS element deactivator of the EAS element deactivation system subsequent to when the confirmation is obtained.
摘要:
Systems and methods for operating an RFID transponder (102). The methods involve: performing energy harvesting operations by a voltage scavenging device (130) of the RFID transponder to collect energy from an RF field, magnetic field, heat, light or movement of the RFID transponder; increasing or decreasing, by a voltage converter of the RFID transponder, a voltage level of a signal received from the voltage scavenging device to a sub-threshold voltage level that is at least one order of magnitude below a normal operating range for the RFID transponder; and supplying an operating voltage at the sub-threshold voltage level to at least a transceiver circuit (124) of the RFID transponder.
摘要:
Systems (100) and methods (1100) for activating an Electronic Article Surveillance (“EAS”) element deactivator. The methods involve: obtaining customer-related data from a customer of a business organization who is attempting to deactivate an EAS element of at least one item; obtaining transaction data contained in a receipt issued upon completion of a checkout transaction for the customer; communicating the customer-related data, transaction data and a unique identifier for an EAS element deactivation system to a remote computing device; processing the customer-related data and transaction data to obtain confirmation that the customer has recently successfully completed the checkout transaction for the item and the EAS element of the item has not yet been deactivated; and activating the EAS element deactivator of the EAS element deactivation system subsequent to when the confirmation is obtained.
摘要:
Predictive theft notifications are used to coordinate appropriate responses to persons who are likely to commit acts of theft. Image data is generated and processed in a computer processing device to recognize the presence of a facial image comprising a face of a person. An analysis is performed of data representative of the facial image to determine a biometric match relative to one or more biometric models of facial images stored in a database. Based on this analysis, at least one predictive notification is generated with regard to a future potential theft of merchandise from the secured facility. The predictive notification is generated based upon a determination of the biometric match.