摘要:
Method for performing electronic article surveillance includes generating image data using at least one imaging device. The image data is processed in a computer processing device associated with an electronic article surveillance (EAS) pedestal to recognize the presence of a facial image. Based on such processing, data representative of the facial image is selectively communicated to a server at a location remote from the EAS pedestal. Subsequently, a notification is received from the server. The notification is based on an identification analysis involving actions performed at the server to identify a particular person using the facial image data. Thereafter, at least one EAS operation is selectively controlled at the EAS pedestal based on a content of the notification.
摘要:
A system for detecting electronic article surveillance (“EAS”) marker shielding includes an EAS subsystem, a metal detector, an object detector, a timer, a cart detection subsystem and a processor. The EAS subsystem is operable to detect an EAS marker in an interrogation zone. The metal detector is operable to detect a metal object in the interrogation zone. The object detector is operable to detect objects located proximate to an entry point of the EAS subsystem. The timer is programmed to start a countdown sequence upon receiving a signal generated by the object detector. The cart detection subsystem includes a sensor array. The cart detection subsystem is operable to differentiate between a wheeled device and a human passing through the interrogation zone based on an output of the sensor array. The processor is electrically coupled to the EAS subsystem, the metal detector, the object detector, the timer and the cart detection subsystem. The processor is programmed to receive a signal from the object detector and the timer to initiate gathering information outputted from the cart detection subsystem and information outputted from the metal detector to determine whether to generate an alarm signal based on the presence of EAS marker shielding.
摘要:
Method for performing electronic article surveillance includes generating image data using at least one imaging device. The image data is processed in a computer processing device associated with an electronic article surveillance (EAS) pedestal to recognize the presence of a facial image. Based on such processing, data representative of the facial image is selectively communicated to a server at a location remote from the EAS pedestal. Subsequently, a notification is received from the server. The notification is based on an identification analysis involving actions performed at the server to identify a particular person using the facial image data. Thereafter, at least one EAS operation is selectively controlled at the EAS pedestal based on a content of the notification.
摘要:
A method and system for detecting an object transiting an interrogation zone of an electronic article surveillance (“EAS”) system and determining whether the object is a person entering or exiting the facility in order to increment a corresponding counter. A first zone detector detects motion in a first zone. The first zone detector can be a first passive infrared (“PIR”) detector. A second zone detector detects motion in a second zone different from the first zone. The second zone detector can be a second PIR detector. A processor is in communication with the first and second zone detectors in which the processor receives data from the first and second zone detectors to determine whether to increment a count value based at least in part on the received data.
摘要:
Predictive theft notifications are used to coordinate appropriate responses to persons who are likely to commit acts of theft. Image data is generated and processed in a computer processing device to recognize the presence of a facial image comprising a face of a person. An analysis is performed of data representative of the facial image to determine a biometric match relative to one or more biometric models of facial images stored in a database. Based on this analysis, at least one predictive notification is generated with regard to a future potential theft of merchandise from the secured facility. The predictive notification is generated based upon a determination of the biometric match.
摘要:
Predictive theft notifications are used to coordinate appropriate responses to persons who are likely to commit acts of theft. Image data is generated and processed in a computer processing device to recognize the presence of a facial image comprising a face of a person. An analysis is performed of data representative of the facial image to determine a biometric match relative to one or more biometric models of facial images stored in a database. Based on this analysis, at least one predictive notification is generated with regard to a future potential theft of merchandise from the secured facility. The predictive notification is generated based upon a determination of the biometric match.
摘要:
Systems (100) and methods (1800) for determining where an object or person is located in an EAS detection zone. The methods involve: simultaneously emitting a first signal from a first emitter and a second signal from a second emitter; concurrently detecting the first and second signals during a first period of time by each of a first detector and a second detector; and determining where the object or person is within the EAS detection zone based on a pattern of a signal output from at least one of the first and second detectors which reflects that at least one of the first and second signals is blocked by the object or person during at least one of a second period of time and a third period of time in which the object or person is traveling through the EAS detection zone.
摘要:
Systems (100) and methods (1800) for determining where an object or person is located in an EAS detection zone. The methods involve: simultaneously emitting a first signal from a first emitter and a second signal from a second emitter; concurrently detecting the first and second signals during a first period of time by each of a first detector and a second detector; and determining where the object or person is within the EAS detection zone based on a pattern of a signal output from at least one of the first and second detectors which reflects that at least one of the first and second signals is blocked by the object or person during at least one of a second period of time and a third period of time in which the object or person is traveling through the EAS detection zone.
摘要:
Systems (100) and methods (1800) for determining where an object or person is located in an EAS detection zone. The methods involve: simultaneously emitting a first signal from a first emitter and a second signal from a second emitter; concurrently detecting the first and second signals during a first period of time by each of a first detector and a second detector; and determining where the object or person is within the EAS detection zone based on a pattern of a signal output from at least one of the first and second detectors which reflects that at least one of the first and second signals is blocked by the object or person during at least one of a second period of time and a third period of time in which the object or person is traveling through the EAS detection zone.
摘要:
Systems (100) and methods (1800) for determining where an object or person is located in an EAS detection zone. The methods involve: simultaneously emitting a first signal from a first emitter and a second signal from a second emitter; concurrently detecting the first and second signals during a first period of time by each of a first detector and a second detector; and determining where the object or person is within the EAS detection zone based on a pattern of a signal output from at least one of the first and second detectors which reflects that at least one of the first and second signals is blocked by the object or person during at least one of a second period of time and a third period of time in which the object or person is traveling through the EAS detection zone.