摘要:
A method, activity monitoring station and system automatically track lost or stolen items. The method begins by searching a sales activity database for at least one sales data record containing information for items sold or offered for sale on at least one Internet site, and searching a loss database for at least one loss data record containing information relating to lost or stolen items. The at least one sales data record is compared to the at least one loss data record to discover at least one matching item. If at least one matching item is discovered, a suspicious activity report is generated.
摘要:
A resonant circuit tuning system and a method for tuning are provided. The resonant circuit tuning system may include a resonant circuit having a first capacitive element in series between a transmitter and an antenna coil and a second capacitive element in parallel with the transmitter and the antenna coil. At least one of the first capacitive element and second capacitive element may be configured to be varied. The resonant circuit tuning system also may include a controller for controlling a variable value of at least one of the first and second capacitive elements.
摘要:
A resonant circuit tuning system and a method for tuning are provided. The resonant circuit tuning system may include an LCR circuit and a reactive element magnetically coupled to the LCR circuit.
摘要:
A surveillance system includes one or more camera systems at least some of the camera systems including a camera element comprising optical components to capture and process light to produce images, camera processing circuitry that receives the light and processes the light into electrical signals and encodes the signals into a defined format, power management circuitry to power the camera system, the power management system including first and second power interfaces and first and second video output interfaces.
摘要:
Systems (100) and methods (1400) for verifying a detachment of a security tag (108) from an article. The methods comprise: producing by a detaching unit (106) a first signal at a first frequency and a second signal at a second frequency when the security tag is in proximity thereto; generating, by a non-linear electrical circuit (504) of the security tag, a third signal from the first and second signals applied thereto; ceasing generation of the third signal by the non-linear electrical circuit when at least a first portion (306) of the security tag is moved a certain distance from the detaching unit; and determining by the detaching unit that the first portion of the security tag has been decoupled from a second portion (318) of the security tag when the third signal is no longer being generated by the non-linear electrical circuit.
摘要:
Systems (100) and methods (500, 600) for adaptively managing power for an Energy Harvesting System (“EHS”). The methods involve: measuring a light intensity level available in a surrounding environment; wirelessly communicating a first wireless signal from the EHS (100) to a remote device (700) for causing the light intensity level to be increased by remotely turning on a light source (106, 108) or opening a cover preventing light emitted from the light source from reaching the EHC, when the light intensity level is below a pre-specified level; using an Energy Harvesting Circuit (“EHC”) to recharge a rechargeable battery (310) when the light intensity level rises above the pre-specified level; and wirelessly communicating a second wireless signal from the EHS to the remote device for causing the light source be turned off or the cover to be closed, when the capacity or state-of-charge of the rechargeable battery reaches a pre-specified value.
摘要:
Systems (100) and methods (200) for dynamically managing Functional Configurations (“FCs”) of network nodes (104, 134-138). The methods involve performing operations by a First End Node (“FEN”) in accordance with a first FC. FEN (104) has a first Software Module (“SM”) stored thereon specifying the first FC. The first SM (122) comprises a total set of codes/functions which determine how a network node is to behave. The first EN detects a trigger event for triggering a transition from the first FC to a second FC. In response to the trigger event, the FEN automatically and dynamically obtains, from a remote network node (134, 136, 138 or 144), a second SM (124 or 126) that is different than the first SM. The first SM (stored on FEN) is then replaced with the second SM. The FEN executes the second SM such that it operates in accordance with the second FC.
摘要:
Disclosed are techniques to authenticate tags passing through detection regions against an access control list, receive data that identifies a number of people passing through or within the detection regions, compare the number people identified by the received data with the number of tags identified by the system, and cause an alarm to be asserted when a discrepancy is detected in the number people identified with the number of tags in a detection region with personnel within the detection region.
摘要:
A networked system for managing a physical intrusion detection/alarm includes an upper tier of server devices, comprising: processor devices and memory in communication with the processor devices, a middle tier of gateway devices that are in communication with upper tier servers, and a lower level tier of devices that comprise fully functional nodes with at least some of the functional nodes including an application layer that execute routines to provide node functions, and a device to manage the lower tier of devices, the device instantiating a program manager that executes a state machine to control the application layer in each of the at least some of the functional nodes.